Action not permitted
Modal body text goes here.
cve-2020-14040
Vulnerability from cvelistv5
Published
2020-06-17 19:22
Modified
2024-08-04 12:32
Severity
Summary
The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/golang-announce/bXVeAmGOqz0" }, { "name": "FEDORA-2020-a55f130272", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-07T18:06:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/golang-announce/bXVeAmGOqz0" }, { "name": "FEDORA-2020-a55f130272", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-14040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" }, { "name": "FEDORA-2020-a55f130272", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-14040", "datePublished": "2020-06-17T19:22:31", "dateReserved": "2020-06-12T00:00:00", "dateUpdated": "2024-08-04T12:32:14.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-14040\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-06-17T20:15:09.993\",\"lastModified\":\"2023-11-07T03:17:05.563\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.\"},{\"lang\":\"es\",\"value\":\"El paquete x/text anterior a la versi\u00f3n 0.3.3 para Go tiene una vulnerabilidad en la codificaci\u00f3n/unicode que podr\u00eda llevar al decodificador UTF-16 a ingresar en un bucle infinito, causando que el programa se bloquee o se ejecute fuera de la memoria. Un atacante podr\u00eda proporcionar un solo byte a un decodificador UTF16 instanciado con UseBOM o ExpectBOM para activar un bucle infinito si se llama a la funci\u00f3n String en el Decoder, o el Decoder es pasado a golang.org/x/text/transform.String\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.3.3\",\"matchCriteriaId\":\"C111DDBC-C8B1-498F-8F36-C8AB6E1134D7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"}]}]}],\"references\":[{\"url\":\"https://groups.google.com/forum/#%21topic/golang-announce/bXVeAmGOqz0\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2020_5055
Vulnerability from csaf_redhat
Published
2020-11-10 13:55
Modified
2024-09-18 04:28
Summary
Red Hat Security Advisory: buildah security update
Notes
Topic
An update for buildah is now available for Red Hat Enterprise Linux 7 Extras.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for buildah is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. \n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5055", "url": "https://access.redhat.com/errata/RHSA-2020:5055" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_5055.json" } ], "title": "Red Hat Security Advisory: buildah security update", "tracking": { "current_release_date": "2024-09-18T04:28:07+00:00", "generator": { "date": "2024-09-18T04:28:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:5055", "initial_release_date": "2020-11-10T13:55:01+00:00", "revision_history": [ { "date": "2020-11-10T13:55:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-10T13:55:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:28:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.11.6-12.el7_9.x86_64", "product": { "name": "buildah-0:1.11.6-12.el7_9.x86_64", "product_id": "buildah-0:1.11.6-12.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-12.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-12.el7_9.x86_64", "product": { "name": "buildah-debuginfo-0:1.11.6-12.el7_9.x86_64", "product_id": "buildah-debuginfo-0:1.11.6-12.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-12.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.11.6-12.el7_9.src", "product": { "name": "buildah-0:1.11.6-12.el7_9.src", "product_id": "buildah-0:1.11.6-12.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-12.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.11.6-12.el7_9.ppc64le", "product": { "name": "buildah-0:1.11.6-12.el7_9.ppc64le", "product_id": "buildah-0:1.11.6-12.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-12.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "product": { "name": "buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "product_id": "buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-12.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.11.6-12.el7_9.s390x", "product": { "name": "buildah-0:1.11.6-12.el7_9.s390x", "product_id": "buildah-0:1.11.6-12.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-12.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "product": { "name": "buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "product_id": "buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-12.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.ppc64le" }, "product_reference": "buildah-0:1.11.6-12.el7_9.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.s390x" }, "product_reference": "buildah-0:1.11.6-12.el7_9.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-12.el7_9.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.src" }, "product_reference": "buildah-0:1.11.6-12.el7_9.src", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.x86_64" }, "product_reference": "buildah-0:1.11.6-12.el7_9.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.s390x" }, "product_reference": "buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.x86_64" }, "product_reference": "buildah-debuginfo-0:1.11.6-12.el7_9.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.ppc64le" }, "product_reference": "buildah-0:1.11.6-12.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.s390x" }, "product_reference": "buildah-0:1.11.6-12.el7_9.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-12.el7_9.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.src" }, "product_reference": "buildah-0:1.11.6-12.el7_9.src", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.x86_64" }, "product_reference": "buildah-0:1.11.6-12.el7_9.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.s390x" }, "product_reference": "buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.x86_64" }, "product_reference": "buildah-debuginfo-0:1.11.6-12.el7_9.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.s390x", "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.src", "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.x86_64", "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.src", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.s390x", "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.src", "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.x86_64", "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.src", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5055" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.s390x", "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.src", "7Server-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.x86_64", "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "7Server-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.src", "7Workstation-EXTRAS-7.9:buildah-0:1.11.6-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:buildah-debuginfo-0:1.11.6-12.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2020_5149
Vulnerability from csaf_redhat
Published
2020-11-18 15:05
Modified
2024-09-18 04:27
Summary
Red Hat Security Advisory: Release of OpenShift Serverless 1.11.0
Notes
Topic
Release of OpenShift Serverless 1.11.0
Details
Red Hat OpenShift Serverless 1.11.0 is a generally available release of the
OpenShift Serverless Operator. This version of the OpenShift Serverless
Operator is supported on Red Hat OpenShift Container Platform version 4.6.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless 1.11.0", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless 1.11.0 is a generally available release of the\nOpenShift Serverless Operator. This version of the OpenShift Serverless\nOperator is supported on Red Hat OpenShift Container Platform version 4.6.\n\nSecurity Fix(es): \n * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, see the CVE page(s) listed in the\nReferences section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5149", "url": "https://access.redhat.com/errata/RHSA-2020:5149" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1889831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889831" }, { "category": "external", "summary": "1889833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889833" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_5149.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.11.0", "tracking": { "current_release_date": "2024-09-18T04:27:30+00:00", "generator": { "date": "2024-09-18T04:27:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:5149", "initial_release_date": "2020-11-18T15:05:44+00:00", "revision_history": [ { "date": "2020-11-18T15:05:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-18T15:05:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:27:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Openshift Serverless 1.11", "product": { "name": "Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.11::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631_amd64", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631_amd64", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631_amd64", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.17.3-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2_amd64", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2_amd64", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.17.2-9" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30_amd64", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30_amd64", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.17.2-9" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.17.2-9" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.17.2-9" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.17.2-9" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.17.2-9" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9_amd64", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9_amd64", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.17.2-9" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64_amd64", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64_amd64", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.17.2-9" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4_amd64", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4_amd64", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.17.2-10" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39_amd64", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39_amd64", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.17.2-10" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810_amd64", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810_amd64", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.17.2-10" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92_amd64", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92_amd64", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.11.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1_amd64", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1_amd64", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1_amd64", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.11.0-6" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137_amd64", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137_amd64", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137_amd64", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.17.3-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b_amd64", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b_amd64", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b_amd64", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.17.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477_amd64", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477_amd64", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477_amd64", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.11.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca_amd64", "product": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca_amd64", "product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.11.0-9" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5_amd64", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5_amd64", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.11.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f_amd64", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f_amd64", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.17.3-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.17.3-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.17.3-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc_amd64", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc_amd64", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.17.3-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f_amd64", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f_amd64", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.17.3-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97_amd64", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97_amd64", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.17.3-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d_amd64", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d_amd64", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.17.3-4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631_amd64" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2_amd64" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30_amd64" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4_amd64" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39_amd64" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810_amd64" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92_amd64" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137_amd64" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1_amd64" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b_amd64" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca_amd64" }, "product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5_amd64" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f_amd64" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc_amd64" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f_amd64" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97_amd64" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d_amd64" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477_amd64 as a component of Openshift Serverless 1.11", "product_id": "8Base-Openshift-Serverless-1.11:openshift-serverless-1/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477_amd64" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.11:openshift-serverless-1/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index", "product_ids": [ "8Base-Openshift-Serverless-1.11:openshift-serverless-1/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5149" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.11:openshift-serverless-1/client-kn-rhel8@sha256:3f419d56adb6a1f5bb43af9989b895943802b54c59d0d46bda7aeb10437c9631_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:913b0faa0044367c6a799a85e7a019374ef893e0725633a9a0613191aa0acdd2_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-controller-rhel8@sha256:ddc51429006713cddea6c8974bc6495e7b89cd32f547e9cc5886d51a61c73b30_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:ad36e4c0090437423b6aedcd810c8081147f4bb97de39feba6e236054bd17a45_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:30f8927c02c8c1f60e77a85653900c072cb20df8062ad5a784231b2dfd606f57_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:855d7eec56b54f50965c992bc18a1afbcdf1daf5e0513503bf703de53131cddd_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:112b46af6fe8cf4e162f33342a4f3e562b6a8e81b312b9305fdbaadf80d2a7db_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:aa142fde5cef75a217f5ce9e48d81550ad41d887c2bd57b2cae3ef82b4ff85f9_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-mtping-rhel8@sha256:77884d76bada6ea22c4e5c98a44e4efae764fc47794b1225bebb34a871727e64_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:2cbc0c20433683576afa61a70202655faf2281c421f0450044757d4b1c9078b4_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:ce65adf0b085be1498cd5cbaf257407d2bb006b21021bfc6b2a9bc098ced1a39_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/eventing-webhook-rhel8@sha256:b5af285977dc8af83aa013fb5b3c71a7a1eb022b2d27aa949c733d483099a810_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/ingress-rhel8-operator@sha256:1e4f1a32bf697f0b0905ac6d2f990b0eb64e60c8bdc46f78ec5f94e533907e92_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:96cc3479579df33c38d64bd923c00b22157e995e6a0c067909398ad98eb64137_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/knative-rhel8-operator@sha256:3240a12f01ad882161271d1574e0f65abfa06f3e4f080e5b23bd4216dc62c1f1_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/kourier-control-rhel8@sha256:58cd8778349c972b353ffb7f3002a68e4ba6bad71b7c17b362bd83439f8a965b_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serverless-operator-bundle@sha256:781665631ab00e0c1a68b932624d84da76b65e3f140cb6561084ce7b5d0b68ca_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serverless-rhel8-operator@sha256:f39ddbf71cad46501520e0ca4f8424d9526bdf9a699fd8a2fb14331a90730ee5_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-activator-rhel8@sha256:7f159de460cfecf94cbbe6326c1dfc2a567ab1843c97d7df02c7237317908b9f_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:ca5a50fbcb4c981de9bea8449961b42d94e5d8cfe9638b2afce895751a03c8f0_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-autoscaler-rhel8@sha256:eb3bcf8ee5743890db8924d723869867f33647c9f0ce689ebb7e13f8768b9267_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-controller-rhel8@sha256:c2a5d1b0fb2d88c246829aff46702999e6c47c5d4d72769718c72906b68a85dc_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-queue-rhel8@sha256:89e5e58ce2c9b553cf21852b12a581cf15fe6be6473a195edd3d04858cbc1e5f_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:4db39d5500d77f8c40e0eea8a935709d3c8d95dce40bd51cd1b0941623246b97_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/serving-webhook-rhel8@sha256:3f8bea5650528bdfe5f9a548a2bdf2ef64e5dec69cff75f84dc398b01cae750d_amd64", "8Base-Openshift-Serverless-1.11:openshift-serverless-1/svls-must-gather-rhel8@sha256:7ae2a473ba0d39177175d647de95576405484ca0c4844d25a6ea887bf0c30477_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2021_0799
Vulnerability from csaf_redhat
Published
2021-03-10 11:41
Modified
2024-09-18 04:27
Summary
Red Hat Security Advisory: OpenShift Virtualization 2.6.0 security and bug fix update
Notes
Topic
An update is now available for RHEL-8-CNV-2.6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 2.6.0 images:
RHEL-8-CNV-2.6
==============
kubevirt-cpu-node-labeller-container-v2.6.0-5
kubevirt-cpu-model-nfd-plugin-container-v2.6.0-5
node-maintenance-operator-container-v2.6.0-13
kubevirt-vmware-container-v2.6.0-5
virtio-win-container-v2.6.0-5
kubevirt-kvm-info-nfd-plugin-container-v2.6.0-5
bridge-marker-container-v2.6.0-9
kubevirt-template-validator-container-v2.6.0-9
kubevirt-v2v-conversion-container-v2.6.0-6
kubemacpool-container-v2.6.0-13
kubevirt-ssp-operator-container-v2.6.0-40
hyperconverged-cluster-webhook-container-v2.6.0-73
hyperconverged-cluster-operator-container-v2.6.0-73
ovs-cni-plugin-container-v2.6.0-10
cnv-containernetworking-plugins-container-v2.6.0-10
ovs-cni-marker-container-v2.6.0-10
cluster-network-addons-operator-container-v2.6.0-16
hostpath-provisioner-container-v2.6.0-11
hostpath-provisioner-operator-container-v2.6.0-14
vm-import-virtv2v-container-v2.6.0-21
kubernetes-nmstate-handler-container-v2.6.0-19
vm-import-controller-container-v2.6.0-21
vm-import-operator-container-v2.6.0-21
virt-api-container-v2.6.0-111
virt-controller-container-v2.6.0-111
virt-handler-container-v2.6.0-111
virt-operator-container-v2.6.0-111
virt-launcher-container-v2.6.0-111
cnv-must-gather-container-v2.6.0-54
virt-cdi-importer-container-v2.6.0-24
virt-cdi-cloner-container-v2.6.0-24
virt-cdi-controller-container-v2.6.0-24
virt-cdi-uploadserver-container-v2.6.0-24
virt-cdi-apiserver-container-v2.6.0-24
virt-cdi-uploadproxy-container-v2.6.0-24
virt-cdi-operator-container-v2.6.0-24
hco-bundle-registry-container-v2.6.0-582
Security Fix(es):
* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)
* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)
* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)
* containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for RHEL-8-CNV-2.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 2.6.0 images:\n\nRHEL-8-CNV-2.6\n==============\nkubevirt-cpu-node-labeller-container-v2.6.0-5\nkubevirt-cpu-model-nfd-plugin-container-v2.6.0-5\nnode-maintenance-operator-container-v2.6.0-13\nkubevirt-vmware-container-v2.6.0-5\nvirtio-win-container-v2.6.0-5\nkubevirt-kvm-info-nfd-plugin-container-v2.6.0-5\nbridge-marker-container-v2.6.0-9\nkubevirt-template-validator-container-v2.6.0-9\nkubevirt-v2v-conversion-container-v2.6.0-6\nkubemacpool-container-v2.6.0-13\nkubevirt-ssp-operator-container-v2.6.0-40\nhyperconverged-cluster-webhook-container-v2.6.0-73\nhyperconverged-cluster-operator-container-v2.6.0-73\novs-cni-plugin-container-v2.6.0-10\ncnv-containernetworking-plugins-container-v2.6.0-10\novs-cni-marker-container-v2.6.0-10\ncluster-network-addons-operator-container-v2.6.0-16\nhostpath-provisioner-container-v2.6.0-11\nhostpath-provisioner-operator-container-v2.6.0-14\nvm-import-virtv2v-container-v2.6.0-21\nkubernetes-nmstate-handler-container-v2.6.0-19\nvm-import-controller-container-v2.6.0-21\nvm-import-operator-container-v2.6.0-21\nvirt-api-container-v2.6.0-111\nvirt-controller-container-v2.6.0-111\nvirt-handler-container-v2.6.0-111\nvirt-operator-container-v2.6.0-111\nvirt-launcher-container-v2.6.0-111\ncnv-must-gather-container-v2.6.0-54\nvirt-cdi-importer-container-v2.6.0-24\nvirt-cdi-cloner-container-v2.6.0-24\nvirt-cdi-controller-container-v2.6.0-24\nvirt-cdi-uploadserver-container-v2.6.0-24\nvirt-cdi-apiserver-container-v2.6.0-24\nvirt-cdi-uploadproxy-container-v2.6.0-24\nvirt-cdi-operator-container-v2.6.0-24\nhco-bundle-registry-container-v2.6.0-582\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0799", "url": "https://access.redhat.com/errata/RHSA-2021:0799" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1732329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732329" }, { "category": "external", "summary": "1783192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783192" }, { "category": "external", "summary": "1791753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791753" }, { "category": "external", "summary": "1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "1848954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848954" }, { "category": "external", "summary": "1848956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848956" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1853911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853911" }, { "category": "external", "summary": "1854098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854098" }, { "category": "external", "summary": "1856347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856347" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1859235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859235" }, { "category": "external", "summary": "1860714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860714" }, { "category": "external", "summary": "1860992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860992" }, { "category": "external", "summary": "1864577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1864577" }, { "category": "external", "summary": "1866593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866593" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1868817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868817" }, { "category": "external", "summary": "1873771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873771" }, { "category": "external", "summary": "1874812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874812" }, { "category": "external", "summary": "1878499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878499" }, { "category": "external", "summary": "1879108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879108" }, { "category": "external", "summary": "1881874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881874" }, { "category": "external", "summary": "1883232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883232" }, { "category": "external", "summary": "1883371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" }, { "category": "external", "summary": "1885153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885153" }, { "category": "external", "summary": "1885418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885418" }, { "category": "external", "summary": "1887398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887398" }, { "category": "external", "summary": "1889295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889295" }, { "category": "external", "summary": "1891285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891285" }, { "category": "external", "summary": "1891440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891440" }, { "category": "external", "summary": "1892227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892227" }, { "category": "external", "summary": "1893278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893278" }, { "category": "external", "summary": "1893646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893646" }, { "category": "external", "summary": "1894428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894428" }, { "category": "external", "summary": "1894824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894824" }, { "category": "external", "summary": "1894897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894897" }, { "category": "external", "summary": "1895414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895414" }, { "category": "external", "summary": "1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "1898072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898072" }, { "category": "external", "summary": "1898840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898840" }, { "category": "external", "summary": "1899558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899558" }, { "category": "external", "summary": "1901480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901480" }, { "category": "external", "summary": "1902046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902046" }, { "category": "external", "summary": "1902111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" }, { "category": "external", "summary": "1903014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903014" }, { "category": "external", "summary": "1903585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903585" }, { "category": "external", "summary": "1904797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904797" }, { "category": "external", "summary": "1906199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906199" }, { "category": "external", "summary": "1907151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907151" }, { "category": "external", "summary": "1907352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907352" }, { "category": "external", "summary": "1907691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907691" }, { "category": "external", "summary": "1907988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907988" }, { "category": "external", "summary": "1908363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908363" }, { "category": "external", "summary": "1908421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908421" }, { "category": "external", "summary": "1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "1909458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909458" }, { "category": "external", "summary": "1910857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910857" }, { "category": "external", "summary": "1911118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911118" }, { "category": "external", "summary": "1911396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911396" }, { "category": "external", "summary": "1911662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911662" }, { "category": "external", "summary": "1912908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912908" }, { "category": "external", "summary": "1913248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913248" }, { "category": "external", "summary": "1913320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913320" }, { "category": "external", "summary": "1913717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913717" }, { "category": "external", "summary": "1913756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913756" }, { "category": "external", "summary": "1914177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914177" }, { "category": "external", "summary": "1914608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914608" }, { "category": "external", "summary": "1914947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914947" }, { "category": "external", "summary": "1917908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917908" }, { "category": "external", "summary": "1917963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917963" }, { "category": "external", "summary": "1919391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391" }, { "category": "external", "summary": "1920576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920576" }, { "category": "external", "summary": "1920610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920610" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1923979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923979" }, { "category": "external", "summary": "1927373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927373" }, { "category": "external", "summary": "1931376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931376" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0799.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.0 security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:27:31+00:00", "generator": { "date": "2024-09-18T04:27:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0799", "initial_release_date": "2021-03-10T11:41:12+00:00", "revision_history": [ { "date": "2021-03-10T11:41:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-10T11:41:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:27:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 2.6 for RHEL 8", "product": { "name": "CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "product": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.6.0-25" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product": { "name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_id": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v2.6.0-25" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64" }, "product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "relates_to_product_reference": "8Base-CNV-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-9283", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2020-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1804533" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform uses the vulnerable library in a number of components but strictly as an SSH client. The severity of this vulnerability is reduced for clients as it requires connections to malicious SSH servers, with the maximum impact only a client crash. This vulnerability is rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9283" }, { "category": "external", "summary": "RHBZ#1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY", "url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY" } ], "release_date": "2020-02-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2020-26160", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1883371" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in jwt-go where it is vulnerable to Access Restriction Bypass if m[\"aud\"] happens to be []string{}, as allowed by the spec, the type assertion fails and the value of aud is \"\". This can cause audience verification to succeed even if the audiences being passed are incorrect if required is set to false.", "title": "Vulnerability description" }, { "category": "summary", "text": "jwt-go: access restriction bypass vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The github.com/dgrijalva/jwt-go module is an indirect dependency of the k8s.io/client-go module pulled into Quay Bridge, and Setup operators via the Operator\u0027s SDK generated code. The k8s.io/client-go module does not use jwt-go in an unsafe way [1]. Red Hat Quay components have been marked as wontfix. This may be fixed in the future.\n\nSimilar to Quay, multiple OpenShift Container Platform (OCP) containers include jwt-go as a transient dependency due to go-autorest [1]. As such, those containers do not use jwt-go in an unsafe way. They have been marked wontfix at this time and may be fixed in a future update.\n\nSame as Quay and OpenShift Container Platform, components shipped with Red Hat OpenShift Container Storage 4 do not use jwt-go in an unsafe way and hence this issue has been rated as having a security impact of Low. A future update may address this issue.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli as a technical preview and is not currently planned to be addressed in future updates, hence the multi-cloud-object-gateway-cli package will not be fixed.\n\n[1] https://github.com/Azure/go-autorest/issues/568#issuecomment-703804062", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26160" }, { "category": "external", "summary": "RHBZ#1883371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26160", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515" } ], "release_date": "2020-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jwt-go: access restriction bypass vulnerability" }, { "cve": "CVE-2020-27813", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902111" } ], "notes": [ { "category": "description", "text": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gorilla-websocket: integer overflow leads to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27813" }, { "category": "external", "summary": "RHBZ#1902111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27813", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813" }, { "category": "external", "summary": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh", "url": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh" } ], "release_date": "2019-08-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gorilla-websocket: integer overflow leads to denial of service" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1897635" } ], "notes": [ { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "RHBZ#1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: panic during recursive division of very large numbers" }, { "cve": "CVE-2020-29652", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908883" } ], "notes": [ { "category": "description", "text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference", "title": "Vulnerability summary" }, { "category": "other", "text": "A large number of products include the affected package, but do not make use of the vulnerable SSH server code. Accordingly, the flaw itself is rated as \"Important\", but these products themselves all have a \"Low\" severity rating.\n\nAdditionally, a number of products include golang.org/x/crypto (or even golang.org/x/crypto/ssh/terminal) but not specifically golang.org/x/crypto/ssh/server.go in the final build. As this would result in a very large number of entries of not affected products, only products which include the ssh server code (golang.org/x/crypto/ssh/server.go) have been represented here. \n\nRed Hat Enterprise Linux 8 container-tools:rhel8/containernetworking-plugins is not affected because although it uses some functionality from golang.org/x/crypto, it does not use or import anything from golang.org/x/crypto/ssh/*.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29652" }, { "category": "external", "summary": "RHBZ#1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" } ], "release_date": "2020-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "acknowledgments": [ { "names": [ "Casey Callendrello" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-20206", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919391" } ], "notes": [ { "category": "description", "text": "An improper limitation of path name flaw was found in containernetworking/cni. When specifying the plugin to load in the `type` field in the network configuration, it is possible to use special elements such as \"../\" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as `reboot`. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) does package a vulnerable version of containernetworking/cni, however, the NetworkDefinitionAttachment is defined in code and cannot be easily changed except through a user who has access to the operator namespace such as cluster-admin. As such, for OSSM, the impact is Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20206" }, { "category": "external", "summary": "RHBZ#1919391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20206", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206" } ], "release_date": "2021-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration" } ] }
rhsa-2021_2039
Vulnerability from csaf_redhat
Published
2021-05-19 08:01
Modified
2024-09-18 04:28
Summary
Red Hat Security Advisory: Service Registry (container images) release and security update [1.1.1.GA]
Notes
Topic
An update to the images for Red Hat Integration Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Red Hat Integration - Service registry 1.1.1.GA serves as a replacement for 1.1.0.GA, and includes the below security fixes.
Security Fix(es):
* hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used (CVE-2020-25638)
* jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) (CVE-2020-25649)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update to the images for Red Hat Integration Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Integration - Service registry 1.1.1.GA serves as a replacement for 1.1.0.GA, and includes the below security fixes.\n\nSecurity Fix(es):\n\n* hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used (CVE-2020-25638)\n\n* jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) (CVE-2020-25649)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2039", "url": "https://access.redhat.com/errata/RHSA-2021:2039" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://catalog.redhat.com/software/operators/detail/5ef2818e7dc79430ca5f4fd2", "url": "https://catalog.redhat.com/software/operators/detail/5ef2818e7dc79430ca5f4fd2" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1881353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881353" }, { "category": "external", "summary": "1887664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887664" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_2039.json" } ], "title": "Red Hat Security Advisory: Service Registry (container images) release and security update [1.1.1.GA]", "tracking": { "current_release_date": "2024-09-18T04:28:39+00:00", "generator": { "date": "2024-09-18T04:28:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:2039", "initial_release_date": "2021-05-19T08:01:05+00:00", "revision_history": [ { "date": "2021-05-19T08:01:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-19T08:01:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:28:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Integration", "product": { "name": "Red Hat Integration", "product_id": "Red Hat Integration", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:1" } } } ], "category": "product_family", "name": "Red Hat Integration" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Integration" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Integration" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2039" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Integration" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-25638", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2020-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881353" } ], "notes": [ { "category": "description", "text": "A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Process Automation Manager and Red Hat Decision Manager, the kie-server-ee7 zip is primarily for Weblogic/Websphere which is decided to stay on hibernate 5.1.x, it\u0027s not possible to make an upgrade to 5.3.x due to technical reasons. For this reason this fix is included only for kie-server-ee7. For this reason there are two components for RHPAM and RHDM.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Integration" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25638" }, { "category": "external", "summary": "RHBZ#1881353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25638", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25638" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25638", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25638" } ], "release_date": "2020-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Integration" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2039" }, { "category": "workaround", "details": "Set hibernate.use_sql_comments to false, which is the default value, or use named parameters instead of literals. Please refer to details in https://docs.jboss.org/hibernate/orm/5.4/userguide/html_single/Hibernate_User_Guide.html#configurations-logging and https://docs.jboss.org/hibernate/orm/5.4/userguide/html_single/Hibernate_User_Guide.html#sql-query-parameters.", "product_ids": [ "Red Hat Integration" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Integration" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used" }, { "cve": "CVE-2020-25649", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2020-08-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1887664" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)", "title": "Vulnerability summary" }, { "category": "other", "text": "* Red Hat Enterprise Linux 8 ships a vulnerable version of jackson-databind in the pki-deps:10.6 module. pki-deps:10.6 is for pki-core dependencies, but pki-core does not use the vulnerable DOMDeserializer class and thus has been set to low impact. Future updates may include fixed version of jackson-databind.\n\n* Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind code. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\n* Red Hat Virtualization ships a vulnerable version of jackson-databind, however the vulnerable DOMDeserializer class is not used in the code, therefore reducing impact to low.\n\n* Red Hat OpenShift Container Platform (OCP) ships a vulnerable version of jackson-databind, but in the affected containers the DOMDeserializer class is not used. Additionally access to the containers is restricted to authenticated users only (OpenShift OAuth authentication) reducing the severity of this vulnerability to Low.\nIn OCP 4 there are no plans to maintain ose-logging-elasticsearch5 container, hence marked as wontfix.\n\n* Red Hat Satellite ships affected version of jackson-databind through Candlepin, however, product code does not use DOMDeserializer class and jackson-databind in a vulnerable way. Thus impact has been set to low. A future release may update jackson-databind to a fixed version.\n\n* Red Hat Single Sign-On (RH-SSO) ships affected version of jackson-databind, however, none of the product code is using the affected class (DOMDeserializer). Thus impact has been set to low. RH-SSO will consume the fixed artifact from EAP in the next CP.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Integration" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25649" }, { "category": "external", "summary": "RHBZ#1887664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25649", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25649" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25649", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25649" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2589", "url": "https://github.com/FasterXML/jackson-databind/issues/2589" } ], "release_date": "2020-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat Integration" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2039" }, { "category": "workaround", "details": "There is currently no known mitigation for this flaw.", "product_ids": [ "Red Hat Integration" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Integration" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)" } ] }
rhsa-2020_5606
Vulnerability from csaf_redhat
Published
2020-12-17 05:43
Modified
2024-09-18 04:28
Summary
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6 bug fix and enhancement update
Notes
Topic
An update for mcg is now available for Red Hat OpenShift Container Storage 4.6.0 on RHEL-8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
These updated packages include numerous security fixes, bug fixes, and
enhancements.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
These updated packages include numerous bug fixes and enhancements. Users are
directed to the Red Hat OpenShift Container Storage Release Notes for
information on the most significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index
All Red Hat OpenShift Container Storage users are advised to upgrade to these
updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mcg is now available for Red Hat OpenShift Container Storage 4.6.0 on RHEL-8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated packages include numerous security fixes, bug fixes, and\nenhancements.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese updated packages include numerous bug fixes and enhancements. Users are\ndirected to the Red Hat OpenShift Container Storage Release Notes for\ninformation on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to these\nupdated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5606", "url": "https://access.redhat.com/errata/RHSA-2020:5606" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_5606.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6 bug fix and enhancement update", "tracking": { "current_release_date": "2024-09-18T04:28:07+00:00", "generator": { "date": "2024-09-18T04:28:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:5606", "initial_release_date": "2020-12-17T05:43:57+00:00", "revision_history": [ { "date": "2020-12-17T05:43:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-12-17T05:43:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:28:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product": { "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Storage" }, { "branches": [ { "category": "product_version", "name": "tini-0:0.18.0-5.el8.src", "product": { "name": "tini-0:0.18.0-5.el8.src", "product_id": "tini-0:0.18.0-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=src" } } }, { "category": "product_version", "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src", "product": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src", "product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tini-0:0.18.0-5.el8.x86_64", "product": { "name": "tini-0:0.18.0-5.el8.x86_64", "product_id": "tini-0:0.18.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64", "product": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64", "product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tini-0:0.18.0-5.el8.s390x", "product": { "name": "tini-0:0.18.0-5.el8.s390x", "product_id": "tini-0:0.18.0-5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=s390x" } } }, { "category": "product_version", "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "product": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tini-0:0.18.0-5.el8.ppc64le", "product": { "name": "tini-0:0.18.0-5.el8.ppc64le", "product_id": "tini-0:0.18.0-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "product": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le" }, "product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x" }, "product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src" }, "product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.src", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" }, "product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.18.0-5.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le" }, "product_reference": "tini-0:0.18.0-5.el8.ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.18.0-5.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x" }, "product_reference": "tini-0:0.18.0-5.el8.s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.18.0-5.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src" }, "product_reference": "tini-0:0.18.0-5.el8.src", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.18.0-5.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" }, "product_reference": "tini-0:0.18.0-5.el8.x86_64", "relates_to_product_reference": "8Base-RH-OCS-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "known_not_affected": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5606" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "known_not_affected": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5606" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "known_not_affected": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5606" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_4298
Vulnerability from csaf_redhat
Published
2020-10-27 16:22
Modified
2020-10-28 00:41
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.6.1 image security update
Notes
Topic
An update is now available for Red Hat OpenShift Container Platform 4.6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)
* SSL/TLS: CBC padding timing attack (lucky-13) (CVE-2013-0169)
* grafana: XSS vulnerability via a column style on the "Dashboard > Table Panel" screen (CVE-2018-18624)
* js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358)
* npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions (CVE-2019-16769)
* kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06) (CVE-2020-7013)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser (CVE-2020-7662)
* nodejs-lodash: prototype pollution in zipObjectDeep function (CVE-2020-8203)
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
* jQuery: passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
* grafana: stored XSS (CVE-2020-11110)
* grafana: XSS annotation popup vulnerability (CVE-2020-12052)
* grafana: XSS via column.title or cellLinkTooltip (CVE-2020-12245)
* nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures (CVE-2020-13822)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
* openshift/console: text injection on error page via crafted url (CVE-2020-10715)
* kibana: X-Frame-Option not set by default might lead to clickjacking (CVE-2020-10743)
* openshift: restricted SCC allows pods to craft custom network packets (CVE-2020-14336)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* SSL/TLS: CBC padding timing attack (lucky-13) (CVE-2013-0169)\n\n* grafana: XSS vulnerability via a column style on the \"Dashboard \u003e Table Panel\" screen (CVE-2018-18624)\n\n* js-jquery: prototype pollution in object\u0027s prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358)\n\n* npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions (CVE-2019-16769)\n\n* kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06) (CVE-2020-7013)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser (CVE-2020-7662)\n\n* nodejs-lodash: prototype pollution in zipObjectDeep function (CVE-2020-8203)\n\n* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)\n\n* jQuery: passing HTML containing \u003coption\u003e elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)\n\n* grafana: stored XSS (CVE-2020-11110)\n\n* grafana: XSS annotation popup vulnerability (CVE-2020-12052)\n\n* grafana: XSS via column.title or cellLinkTooltip (CVE-2020-12245)\n\n* nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures (CVE-2020-13822)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)\n\n* openshift/console: text injection on error page via crafted url (CVE-2020-10715)\n\n* kibana: X-Frame-Option not set by default might lead to clickjacking (CVE-2020-10743)\n\n* openshift: restricted SCC allows pods to craft custom network packets (CVE-2020-14336)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4298", "url": "https://access.redhat.com/errata/RHSA-2020:4298" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_4298.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.1 image security update", "tracking": { "current_release_date": "2020-10-28T00:41:00Z", "generator": { "date": "2023-07-01T04:17:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2020:4298", "initial_release_date": "2020-10-27T16:22:00Z", "revision_history": [ { "date": "2020-10-28T00:41:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "category": "product_version", "name": "openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-ansible-operator:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "product": { "name": "openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "product_id": "openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0" } }, { "category": "product_version", "name": "openshift4/ose-cli:v4.6.0-202010080605.p0", "product": { "name": "openshift4/ose-cli:v4.6.0-202010080605.p0", "product_id": "openshift4/ose-cli:v4.6.0-202010080605.p0" } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "product": { "name": "openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "product_id": "openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "product_id": "openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "product": { "name": "openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "product_id": "openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-console-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-console-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-console-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-console:v4.6.0-202010100121.p0", "product": { "name": "openshift4/ose-console:v4.6.0-202010100121.p0", "product_id": "openshift4/ose-console:v4.6.0-202010100121.p0" } }, { "category": "product_version", "name": "openshift4/ose-coredns:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-coredns:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-coredns:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-descheduler:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-descheduler:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-descheduler:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "product": { "name": "openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "product_id": "openshift4/ose-docker-builder:v4.6.0-202010120952.p0" } }, { "category": "product_version", "name": "openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-docker-registry:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-etcd:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-etcd:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-etcd:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-grafana:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-grafana:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-grafana:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "product": { "name": "openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "product_id": "openshift4/ose-hyperkube:v4.6.0-202010081843.p0" } }, { "category": "product_version", "name": "openshift4/ose-installer:v4.6.0-202010081843.p0", "product": { "name": "openshift4/ose-installer:v4.6.0-202010081843.p0", "product_id": "openshift4/ose-installer:v4.6.0-202010081843.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "product": { "name": "openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "product_id": "openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0" } }, { "category": "product_version", "name": "openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-metering-presto:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-multus-cni:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "product_id": "openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0" } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "product": { "name": "openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "product_id": "openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0" } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "product": { "name": "openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "product_id": "openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "product": { "name": "openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "product_id": "openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-operator-registry:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus:v4.6.0-202009290409.p0", "product": { "name": "openshift4/ose-prometheus:v4.6.0-202009290409.p0", "product_id": "openshift4/ose-prometheus:v4.6.0-202009290409.p0" } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-ptp-operator:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-ptp:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-ptp:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-ptp:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "product": { "name": "openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "product_id": "openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "product": { "name": "openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "product_id": "openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0" } }, { "category": "product_version", "name": "openshift4/ose-tests:v4.6.0-202010120952.p0", "product": { "name": "openshift4/ose-tests:v4.6.0-202010120952.p0", "product_id": "openshift4/ose-tests:v4.6.0-202010120952.p0" } } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0" }, "product_reference": "openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli:v4.6.0-202010080605.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0" }, "product_reference": "openshift4/ose-cli:v4.6.0-202010080605.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0" }, "product_reference": "openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0" }, "product_reference": "openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-console-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console:v4.6.0-202010100121.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0" }, "product_reference": "openshift4/ose-console:v4.6.0-202010100121.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-coredns:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-descheduler:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder:v4.6.0-202010120952.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0" }, "product_reference": "openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-etcd:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-grafana:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube:v4.6.0-202010081843.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0" }, "product_reference": "openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer:v4.6.0-202010081843.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0" }, "product_reference": "openshift4/ose-installer:v4.6.0-202010081843.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0" }, "product_reference": "openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-presto:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0" }, "product_reference": "openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0" }, "product_reference": "openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0" }, "product_reference": "openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus:v4.6.0-202009290409.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" }, "product_reference": "openshift4/ose-prometheus:v4.6.0-202009290409.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-ptp:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0" }, "product_reference": "openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0" }, "product_reference": "openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests:v4.6.0-202010120952.p0 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" }, "product_reference": "openshift4/ose-tests:v4.6.0-202010120952.p0", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0169", "discovery_date": "2013-02-04T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "CBC padding timing attack (lucky-13)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/", "url": "http://www.isg.rhul.ac.uk/tls/" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20130205.txt", "url": "http://www.openssl.org/news/secadv_20130205.txt" }, { "category": "external", "summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released", "url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released" }, { "category": "external", "summary": "CVE-2013-0169", "url": "https://access.redhat.com/security/cve/CVE-2013-0169" }, { "category": "external", "summary": "bz#907589: CBC padding timing attack (lucky-13)", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" } ], "release_date": "2013-02-04T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.1, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "PARTIAL", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "PARTIAL", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0" ] } ], "threats": [ { "category": "impact", "date": "2013-02-04T00:00:00Z", "details": "Moderate" } ], "title": "CBC padding timing attack (lucky-13)" }, { "cve": "CVE-2018-18624", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-24T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1850572" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in grafana. An incomplete fix for CVE-2018-12099 allows for a XSS via a column style on the \"Dashboard \u003e Table Panel\" screen.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: XSS vulnerability via a column style on the \"Dashboard \u003e Table Panel\" screen", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-18624", "url": "https://www.cve.org/CVERecord?id=CVE-2018-18624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-18624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18624" }, { "category": "external", "summary": "https://security.netapp.com/advisory/ntap-20200608-0008/", "url": "https://security.netapp.com/advisory/ntap-20200608-0008/" }, { "category": "external", "summary": "CVE-2018-18624", "url": "https://access.redhat.com/security/cve/CVE-2018-18624" }, { "category": "external", "summary": "bz#1850572: CVE-2018-18624 grafana: XSS vulnerability via a column style on the \"Dashboard \u003e Table Panel\" screen", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850572" } ], "release_date": "2020-06-02T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-24T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2018-18624 grafana: XSS vulnerability via a column style on the \"Dashboard \u003e Table Panel\" screen" }, { "cve": "CVE-2019-11358", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-03-28T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11358", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11358" }, { "category": "external", "summary": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", "url": "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/" }, { "category": "external", "summary": "https://www.drupal.org/sa-core-2019-006", "url": "https://www.drupal.org/sa-core-2019-006" }, { "category": "external", "summary": "CVE-2019-11358", "url": "https://access.redhat.com/security/cve/CVE-2019-11358" }, { "category": "external", "summary": "bz#1701972: CVE-2019-11358 jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701972" } ], "release_date": "2019-03-27T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2019-11358 jquery: Prototype pollution in object\u0027s prototype leading to denial of service, remote code execution, or property injection" }, { "cve": "CVE-2019-16769", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1848092" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A XSS flaw was found in npm-serialize-javascript. It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js\u0027s implementation of RegExp.prototype.toString() backslash-escapes all forward slashes in regular expressions. If serialized data of regular expression objects are used in an environment other than Node.js, it is affected by this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16769", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16769" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16769", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16769" }, { "category": "external", "summary": "CVE-2019-16769", "url": "https://access.redhat.com/security/cve/CVE-2019-16769" }, { "category": "external", "summary": "bz#1848092: CVE-2019-16769 npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848092" } ], "release_date": "2020-05-04T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2019-16769 npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions" }, { "cve": "CVE-2020-7013", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2020-06-19T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1849044" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Kibana versions before 6.8.9 and 7.7.0 contain a prototype pollution flaw in TSVB. An authenticated attacker with privileges to create TSVB visualizations could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7013", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7013" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7013", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7013" }, { "category": "external", "summary": "https://discuss.elastic.co/t/elastic-stack-6-8-9-and-7-7-0-security-update/235571", "url": "https://discuss.elastic.co/t/elastic-stack-6-8-9-and-7-7-0-security-update/235571" }, { "category": "external", "summary": "CVE-2020-7013", "url": "https://access.redhat.com/security/cve/CVE-2020-7013" }, { "category": "external", "summary": "bz#1849044: CVE-2020-7013 kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06)", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849044" } ], "release_date": "2020-06-03T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-19T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-7013 kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06)" }, { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" }, { "category": "external", "summary": "CVE-2020-7598", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "bz#1813344: CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" } ], "release_date": "2020-03-10T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-03-11T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-7662", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-06-02T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1845982" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "websocket-extensions npm module prior to 0.1.4 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.", "title": "Vulnerability description" }, { "category": "summary", "text": "npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7662", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7662" }, { "category": "external", "summary": "https://github.com/faye/websocket-extensions-node/security/advisories/GHSA-g78m-2chm-r7qv", "url": "https://github.com/faye/websocket-extensions-node/security/advisories/GHSA-g78m-2chm-r7qv" }, { "category": "external", "summary": "CVE-2020-7662", "url": "https://access.redhat.com/security/cve/CVE-2020-7662" }, { "category": "external", "summary": "bz#1845982: CVE-2020-7662 npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845982" } ], "release_date": "2020-06-02T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-02T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-7662 npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser" }, { "cve": "CVE-2020-8203", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-07-15T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1857412" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in nodejs-lodash in versions 4.17.15 and earlier. A prototype pollution attack is possible which can lead to arbitrary code execution. The primary threat from this vulnerability is to data integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-lodash: prototype pollution in zipObjectDeep function", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8203", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8203", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8203" }, { "category": "external", "summary": "https://hackerone.com/reports/712065", "url": "https://hackerone.com/reports/712065" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1523", "url": "https://www.npmjs.com/advisories/1523" }, { "category": "external", "summary": "CVE-2020-8203", "url": "https://access.redhat.com/security/cve/CVE-2020-8203" }, { "category": "external", "summary": "bz#1857412: CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857412" } ], "release_date": "2020-04-27T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-07-15T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Wouter ter Maat" ], "organization": "Offensi", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8559", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2020-06-26T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1851422" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in the Kubernetes API server, where it allows an attacker to escalate their privileges from a compromised node. This flaw allows an attacker who can intercept requests on a compromised node, to redirect those requests, along with their credentials, to perform actions on other endpoints that trust those credentials (including other clusters), allowing for escalation of privileges. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: compromised node could escalate to cluster level privileges", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8559", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8559" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs", "url": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs" }, { "category": "external", "summary": "CVE-2020-8559", "url": "https://access.redhat.com/security/cve/CVE-2020-8559" }, { "category": "external", "summary": "bz#1851422: CVE-2020-8559 kubernetes: compromised node could escalate to cluster level privileges", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851422" } ], "release_date": "2020-07-15T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-26T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-8559 kubernetes: compromised node could escalate to cluster level privileges" }, { "cve": "CVE-2020-9283", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2020-02-19T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY", "url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY" }, { "category": "external", "summary": "CVE-2020-9283", "url": "https://access.redhat.com/security/cve/CVE-2020-9283" }, { "category": "external", "summary": "bz#1804533: CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" } ], "release_date": "2020-02-21T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-02-19T00:00:00Z", "details": "Important" } ], "title": "CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic" }, { "cve": "CVE-2020-10715", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-10-18T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1767665" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A content spoofing vulnerability was found in the openshift/console. This flaw allows an attacker to craft a URL and inject arbitrary text onto the error page that appears to be from the OpenShift instance. This attack could potentially convince a user that the inserted text is legitimate.", "title": "Vulnerability description" }, { "category": "summary", "text": "openshift/console: text injection on error page via crafted url", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10715", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10715" }, { "category": "external", "summary": "CVE-2020-10715", "url": "https://access.redhat.com/security/cve/CVE-2020-10715" }, { "category": "external", "summary": "bz#1767665: CVE-2020-10715 openshift/console: text injection on error page via crafted url", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767665" } ], "release_date": "2020-07-27T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0" ] } ], "threats": [ { "category": "impact", "date": "2019-10-18T00:00:00Z", "details": "Low" } ], "title": "CVE-2020-10715 openshift/console: text injection on error page via crafted url" }, { "cve": "CVE-2020-10743", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-05-05T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1834550" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "It was discovered that OpenShift Container Platform\u0027s (OCP) distribution of Kibana could open in an iframe, which made it possible to intercept and manipulate requests. This flaw allows an attacker to trick a user into performing arbitrary actions in OCP\u0027s distribution of Kibana, such as clickjacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "kibana: X-Frame-Option not set by default might lead to clickjacking", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10743", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10743" }, { "category": "external", "summary": "CVE-2020-10743", "url": "https://access.redhat.com/security/cve/CVE-2020-10743" }, { "category": "external", "summary": "bz#1834550: CVE-2020-10743 kibana: X-Frame-Option not set by default might lead to clickjacking", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834550" } ], "release_date": "2020-01-27T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-05-05T00:00:00Z", "details": "Low" } ], "title": "CVE-2020-10743 kibana: X-Frame-Option not set by default might lead to clickjacking" }, { "cve": "CVE-2020-11022", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-04-23T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A Cross-site scripting (XSS) vulnerability exists in JQuery. This flaw allows an attacker with the ability to supply input to the \u2018HTML\u2019 function to inject Javascript into the page where that input is rendered, and have it delivered by the browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11022", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11022" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2" }, { "category": "external", "summary": "CVE-2020-11022", "url": "https://access.redhat.com/security/cve/CVE-2020-11022" }, { "category": "external", "summary": "bz#1828406: CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828406" } ], "release_date": "2020-04-23T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-04-23T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method" }, { "cve": "CVE-2020-11023", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-23T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in jQuery. HTML containing \u003coption\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery\u0027s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023" }, { "category": "external", "summary": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/", "url": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" }, { "category": "external", "summary": "CVE-2020-11023", "url": "https://access.redhat.com/security/cve/CVE-2020-11023" }, { "category": "external", "summary": "bz#1850004: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" } ], "release_date": "2020-04-29T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-23T00:00:00Z", "details": "Moderate" } ], "title": "Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods" }, { "cve": "CVE-2020-11110", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-07-27T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1861044" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in grafana. The lack of URL sanitizing allows for stored XSS.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: stored XSS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11110", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11110" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11110", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11110" }, { "category": "external", "summary": "CVE-2020-11110", "url": "https://access.redhat.com/security/cve/CVE-2020-11110" }, { "category": "external", "summary": "bz#1861044: CVE-2020-11110 grafana: stored XSS", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861044" } ], "release_date": "2020-04-01T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-07-27T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-11110 grafana: stored XSS" }, { "cve": "CVE-2020-12052", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1848089" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in grafana. The software is vulnerable to an annotation popup XSS.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: XSS annotation popup vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12052", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12052" }, { "category": "external", "summary": "CVE-2020-12052", "url": "https://access.redhat.com/security/cve/CVE-2020-12052" }, { "category": "external", "summary": "bz#1848089: CVE-2020-12052 grafana: XSS annotation popup vulnerability", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848089" } ], "release_date": "2020-04-27T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-12052 grafana: XSS annotation popup vulnerability" }, { "cve": "CVE-2020-12245", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-04-25T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1848643" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in grafana. A XSS is possible in table-panel via column.title or cellLinkTooltip.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: XSS via column.title or cellLinkTooltip", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12245", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12245" }, { "category": "external", "summary": "CVE-2020-12245", "url": "https://access.redhat.com/security/cve/CVE-2020-12245" }, { "category": "external", "summary": "bz#1848643: CVE-2020-12245 grafana: XSS via column.title or cellLinkTooltip", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848643" } ], "release_date": "2020-04-23T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-04-25T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-12245 grafana: XSS via column.title or cellLinkTooltip" }, { "cve": "CVE-2020-13822", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2020-06-04T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1848647" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "The Elliptic for Node.js allows ECDSA signature malleability via variations in encoding, leading \u0027\\0\u0027 bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13822", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13822" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-ELLIPTIC-571484", "url": "https://snyk.io/vuln/SNYK-JS-ELLIPTIC-571484" }, { "category": "external", "summary": "CVE-2020-13822", "url": "https://access.redhat.com/security/cve/CVE-2020-13822" }, { "category": "external", "summary": "bz#1848647: CVE-2020-13822 nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848647" } ], "release_date": "2020-06-01T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-04T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-13822 nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" }, { "category": "external", "summary": "CVE-2020-14040", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "bz#1853652: CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "release_date": "2020-06-17T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "acknowledgments": [ { "names": [ "Yuval Kashtan" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-14336", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-25T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1858981" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in the Restricted Security Context Constraints (SCC), where it allows pods to craft custom network packets. This flaw allows an attacker to cause a denial of service attack on an OpenShift Container Platform cluster if they can deploy pods. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openshift: restricted SCC allows pods to craft custom network packets", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14336", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14336" }, { "category": "external", "summary": "CVE-2020-14336", "url": "https://access.redhat.com/security/cve/CVE-2020-14336" }, { "category": "external", "summary": "bz#1858981: CVE-2020-14336 openshift: restricted SCC allows pods to craft custom network packets", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858981" } ], "release_date": "2020-07-13T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-25T00:00:00Z", "details": "Low" } ], "title": "CVE-2020-14336 openshift: restricted SCC allows pods to craft custom network packets" }, { "cve": "CVE-2020-15366", "cwe": { "id": "CWE-471", "name": "Modification of Assumed-Immutable Data (MAID)" }, "discovery_date": "2020-07-15T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in nodejs-ajv. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-ansible-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-aws-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-azure-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-machine-controllers:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-baremetal-runtimecfg-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cli-artifacts:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cli:v4.6.0-202010080605.p0", "8Base-RHOSE-4.6:openshift4/ose-cloud-credential-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-authentication-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-autoscaler:v4.6.0-202009291152.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-capacity:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-config-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-dns-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-etcd-rhel8-operator:v4.6.0-202010062159.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-image-registry-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-apiserver-operator:v4.6.0-202010090300.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-controller-manager-operator:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-scheduler-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-machine-approver:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-apiserver-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-openshift-controller-manager-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-policy-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-samples-operator:v4.6.0-202009290409.p0", "8Base-RHOSE-4.6:openshift4/ose-cluster-storage-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-console-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-coredns:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-attacher:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-resizer:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-external-snapshotter:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-livenessprobe:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-node-driver-registrar:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-csi-snapshot-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-descheduler:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-builder:v4.6.0-202010120952.p0", "8Base-RHOSE-4.6:openshift4/ose-docker-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-etcd:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-gcp-machine-controllers-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-grafana:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-hyperkube:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-installer:v4.6.0-202010081843.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-rbac-proxy:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-kube-storage-version-migrator-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-diskmaker:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-local-storage-static-provisioner:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-machine-config-operator:v4.6.0-202010220220.p0", "8Base-RHOSE-4.6:openshift4/ose-mdns-publisher-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-presto:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-metering-reporting-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-admission-controller:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-cni:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-route-override-cni-rhel8:v4.6.0-202010012244.p0", "8Base-RHOSE-4.6:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.6.0-202010011936.p0", "8Base-RHOSE-4.6:openshift4/ose-network-metrics-daemon-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-oauth-proxy:v4.6.0-202010010929.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-apiserver-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-openshift-controller-manager-rhel8:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-lifecycle-manager:v4.6.0-202010130555.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-marketplace:v4.6.0-202010081538.p0", "8Base-RHOSE-4.6:openshift4/ose-operator-registry:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp-operator:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-ptp:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-service-ca-operator:v4.6.0-202010061132.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-dp-admission-controller:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-config-daemon:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-device-plugin:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-sriov-network-webhook:v4.6.0-202010200139.p0", "8Base-RHOSE-4.6:openshift4/ose-tests:v4.6.0-202010120952.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15366", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15366" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-AJV-584908", "url": "https://snyk.io/vuln/SNYK-JS-AJV-584908" }, { "category": "external", "summary": "CVE-2020-15366", "url": "https://access.redhat.com/security/cve/CVE-2020-15366" }, { "category": "external", "summary": "bz#1857977: CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857977" } ], "release_date": "2020-07-04T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:4298" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-console:v4.6.0-202010100121.p0", "8Base-RHOSE-4.6:openshift4/ose-prometheus:v4.6.0-202009290409.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-07-15T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function" } ] }
rhsa-2020_5056
Vulnerability from csaf_redhat
Published
2020-11-10 13:54
Modified
2024-09-18 04:28
Summary
Red Hat Security Advisory: podman security and bug fix update
Notes
Topic
An update for podman is now available for Red Hat Enterprise Linux 7 Extras.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* podman does not use $TMPDIR loading a tar file (BZ#1877699)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for podman is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* podman does not use $TMPDIR loading a tar file (BZ#1877699)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5056", "url": "https://access.redhat.com/errata/RHSA-2020:5056" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1874268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268" }, { "category": "external", "summary": "1877699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877699" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_5056.json" } ], "title": "Red Hat Security Advisory: podman security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:28:14+00:00", "generator": { "date": "2024-09-18T04:28:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:5056", "initial_release_date": "2020-11-10T13:54:40+00:00", "revision_history": [ { "date": "2020-11-10T13:54:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-10T13:54:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:28:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.6.4-26.el7_9.x86_64", "product": { "name": "podman-0:1.6.4-26.el7_9.x86_64", "product_id": "podman-0:1.6.4-26.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-26.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "product": { "name": "podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "product_id": "podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.6.4-26.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.6.4-26.el7_9.src", "product": { "name": "podman-0:1.6.4-26.el7_9.src", "product_id": "podman-0:1.6.4-26.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-26.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "podman-docker-0:1.6.4-26.el7_9.noarch", "product": { "name": "podman-docker-0:1.6.4-26.el7_9.noarch", "product_id": "podman-docker-0:1.6.4-26.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@1.6.4-26.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.6.4-26.el7_9.ppc64le", "product": { "name": "podman-0:1.6.4-26.el7_9.ppc64le", "product_id": "podman-0:1.6.4-26.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-26.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "product": { "name": "podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "product_id": "podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.6.4-26.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.6.4-26.el7_9.s390x", "product": { "name": "podman-0:1.6.4-26.el7_9.s390x", "product_id": "podman-0:1.6.4-26.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.6.4-26.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.6.4-26.el7_9.s390x", "product": { "name": "podman-debuginfo-0:1.6.4-26.el7_9.s390x", "product_id": "podman-debuginfo-0:1.6.4-26.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.6.4-26.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-26.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le" }, "product_reference": "podman-0:1.6.4-26.el7_9.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-26.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x" }, "product_reference": "podman-0:1.6.4-26.el7_9.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-26.el7_9.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src" }, "product_reference": "podman-0:1.6.4-26.el7_9.src", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-26.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64" }, "product_reference": "podman-0:1.6.4-26.el7_9.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-26.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le" }, "product_reference": "podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-26.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x" }, "product_reference": "podman-debuginfo-0:1.6.4-26.el7_9.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-26.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64" }, "product_reference": "podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.6.4-26.el7_9.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch" }, "product_reference": "podman-docker-0:1.6.4-26.el7_9.noarch", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-26.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le" }, "product_reference": "podman-0:1.6.4-26.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-26.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x" }, "product_reference": "podman-0:1.6.4-26.el7_9.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-26.el7_9.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src" }, "product_reference": "podman-0:1.6.4-26.el7_9.src", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.6.4-26.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64" }, "product_reference": "podman-0:1.6.4-26.el7_9.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-26.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le" }, "product_reference": "podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-26.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x" }, "product_reference": "podman-debuginfo-0:1.6.4-26.el7_9.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.6.4-26.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64" }, "product_reference": "podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.6.4-26.el7_9.noarch as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch" }, "product_reference": "podman-docker-0:1.6.4-26.el7_9.noarch", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5056" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-14370", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874268" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in containers/podman. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container leak into subsequent containers. This flaw allows an attacker who controls the subsequent containers to gain access to sensitive information stored in such variables. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst OpenShift Container Platform (OCP) does include podman, the Varlink API is not enabled by default. However, as it is trivial to activate this feature, OCP has been marked as affected.\n\nOCP 3.11 has previously packaged podman, but instead now relies on the version from rhel-extra.The older version previously packaged is not vulnerable to this CVE and hence has been marked not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14370" }, { "category": "external", "summary": "RHBZ#1874268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14370", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370" } ], "release_date": "2020-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5056" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Server-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Server-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Server-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.src", "7Workstation-EXTRAS-7.9:podman-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.s390x", "7Workstation-EXTRAS-7.9:podman-debuginfo-0:1.6.4-26.el7_9.x86_64", "7Workstation-EXTRAS-7.9:podman-docker-0:1.6.4-26.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API" } ] }
rhsa-2020_3369
Vulnerability from csaf_redhat
Published
2020-08-06 20:19
Modified
2024-09-18 04:26
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh security update
Notes
Topic
An update is now available for OpenShift Service Mesh 1.1.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)
* nodejs-lodash: prototype pollution in zipObjectDeep function (CVE-2020-8203)
* jQuery: passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
* macaron: open redirect in the static handler (CVE-2020-12666)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for OpenShift Service Mesh 1.1.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* nodejs-lodash: prototype pollution in zipObjectDeep function (CVE-2020-8203)\n\n* jQuery: passing HTML containing \u003coption\u003e elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)\n\n* macaron: open redirect in the static handler (CVE-2020-12666)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3369", "url": "https://access.redhat.com/errata/RHSA-2020:3369" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "1850004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" }, { "category": "external", "summary": "1850034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850034" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1857412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857412" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_3369.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh security update", "tracking": { "current_release_date": "2024-09-18T04:26:05+00:00", "generator": { "date": "2024-09-18T04:26:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:3369", "initial_release_date": "2020-08-06T20:19:17+00:00", "revision_history": [ { "date": "2020-08-06T20:19:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-08-06T20:19:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:26:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.1", "product": { "name": "OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 1.1", "product": { "name": "Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "ior-0:1.1.6-1.el8.x86_64", "product": { "name": "ior-0:1.1.6-1.el8.x86_64", "product_id": "ior-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-citadel-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-citadel-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-citadel-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-galley-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-galley-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-galley-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-galley@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-mixc-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-mixc-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-mixs-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-mixs-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-14.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-13.el8.x86_64", "product": { "name": "servicemesh-grafana-0:6.4.3-13.el8.x86_64", "product_id": "servicemesh-grafana-0:6.4.3-13.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-13.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "product": { "name": "servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "product_id": "servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-13.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-cni-0:1.1.6-1.el8.x86_64", "product": { "name": "servicemesh-cni-0:1.1.6-1.el8.x86_64", "product_id": "servicemesh-cni-0:1.1.6-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.6-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.6-2.el8.x86_64", "product": { "name": "servicemesh-operator-0:1.1.6-2.el8.x86_64", "product_id": "servicemesh-operator-0:1.1.6-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.6-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kiali-0:v1.12.10.redhat2-1.el7.x86_64", "product": { "name": "kiali-0:v1.12.10.redhat2-1.el7.x86_64", "product_id": "kiali-0:v1.12.10.redhat2-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.10.redhat2-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ior-0:1.1.6-1.el8.src", "product": { "name": "ior-0:1.1.6-1.el8.src", "product_id": "ior-0:1.1.6-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.6-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.6-1.el8.src", "product": { "name": "servicemesh-0:1.1.6-1.el8.src", "product_id": "servicemesh-0:1.1.6-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.6-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-14.el8.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-14.el8.src", "product_id": "servicemesh-prometheus-0:2.14.0-14.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-14.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-13.el8.src", "product": { "name": "servicemesh-grafana-0:6.4.3-13.el8.src", "product_id": "servicemesh-grafana-0:6.4.3-13.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-13.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-cni-0:1.1.6-1.el8.src", "product": { "name": "servicemesh-cni-0:1.1.6-1.el8.src", "product_id": "servicemesh-cni-0:1.1.6-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.6-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.6-2.el8.src", "product": { "name": "servicemesh-operator-0:1.1.6-2.el8.src", "product_id": "servicemesh-operator-0:1.1.6-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.6-2.el8?arch=src" } } }, { "category": "product_version", "name": "kiali-0:v1.12.10.redhat2-1.el7.src", "product": { "name": "kiali-0:v1.12.10.redhat2-1.el7.src", "product_id": "kiali-0:v1.12.10.redhat2-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.10.redhat2-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.10.redhat2-1.el7.src as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src" }, "product_reference": "kiali-0:v1.12.10.redhat2-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.10.redhat2-1.el7.x86_64 as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64" }, "product_reference": "kiali-0:v1.12.10.redhat2-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.6-1.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src" }, "product_reference": "ior-0:1.1.6-1.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64" }, "product_reference": "ior-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.6-1.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src" }, "product_reference": "servicemesh-0:1.1.6-1.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-citadel-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-citadel-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.6-1.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src" }, "product_reference": "servicemesh-cni-0:1.1.6-1.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-cni-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-galley-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-galley-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-13.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src" }, "product_reference": "servicemesh-grafana-0:6.4.3-13.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-13.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64" }, "product_reference": "servicemesh-grafana-0:6.4.3-13.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64" }, "product_reference": "servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.6-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src" }, "product_reference": "servicemesh-operator-0:1.1.6-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.6-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64" }, "product_reference": "servicemesh-operator-0:1.1.6-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-14.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-14.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-14.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" }, "product_reference": "servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-8203", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1857412" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-lodash in versions 4.17.15 and earlier. A prototype pollution attack is possible which can lead to arbitrary code execution. The primary threat from this vulnerability is to data integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-lodash: prototype pollution in zipObjectDeep function", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift ServiceMesh (OSSM), Red Hat OpenShift Jaeger (RHOSJ) and Red Hat OpenShift Container Platform (RHOCP), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-lodash library to authenticated users only, therefore the impact is low.\n\nRed Hat OpenShift Container Platform 4 delivers the kibana package where the nodejs-lodash library is used, but due to the code changing to the container first content the kibana package is marked as wontfix. This may be fixed in the future.\n\nRed Hat Virtualization uses vulnerable version of nodejs-lodash, however zipObjectDeep is not used, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8203" }, { "category": "external", "summary": "RHBZ#1857412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8203", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8203", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8203" }, { "category": "external", "summary": "https://hackerone.com/reports/712065", "url": "https://hackerone.com/reports/712065" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1523", "url": "https://www.npmjs.com/advisories/1523" } ], "release_date": "2020-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3369" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-lodash: prototype pollution in zipObjectDeep function" }, { "cve": "CVE-2020-9283", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2020-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1804533" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform uses the vulnerable library in a number of components but strictly as an SSH client. The severity of this vulnerability is reduced for clients as it requires connections to malicious SSH servers, with the maximum impact only a client crash. This vulnerability is rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9283" }, { "category": "external", "summary": "RHBZ#1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY", "url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY" } ], "release_date": "2020-02-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3369" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic" }, { "cve": "CVE-2020-11023", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1850004" } ], "notes": [ { "category": "description", "text": "A flaw was found in jQuery. HTML containing \\\u003coption\\\u003e elements from untrusted sources are passed, even after sanitizing, to one of jQuery\u0027s DOM manipulation methods, which may execute untrusted code. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux versions 6, 7, and 8 ship a vulnerable version of JQuery in the `pcs` component. However, the vulnerability has not been found to be exploitable in reasonable scenarios. \n\nIn RHEL7, pcs-0.9.169-3.el7_9.3 [RHSA-2022:7343] contains an updated version of jquery (3.6.0), which does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11023" }, { "category": "external", "summary": "RHBZ#1850004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11023" }, { "category": "external", "summary": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/", "url": "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" } ], "release_date": "2020-04-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3369" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Untrusted code execution via \u003coption\u003e tag in HTML passed to DOM manipulation methods" }, { "cve": "CVE-2020-12666", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2020-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1850034" } ], "notes": [ { "category": "description", "text": "A flaw was found in macaron. Path URLs aren\u0027t cleaned before being redirected creating an open redirect in the static handler.", "title": "Vulnerability description" }, { "category": "summary", "text": "macaron: open redirect in the static handler", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue has a low impact on both OpenShift Container Platform and OpenShift Service Mesh grafana containers. As neither components make use of the Static handler the impact is Low. A future version of Grafana may use the Macaron Static handler so we may fix this in a future release.\n\nRed Hat Ceph Storage (RHCS) versions 3 and 4 use Grafana where the affected version of the macaron package is delivered. However the Static handler is not used by Ceph hence the impact by this vulnerability is Low. Ceph-2 has reached End of Extended Life Cycle Support and no longer fixing moderates/lows.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12666" }, { "category": "external", "summary": "RHBZ#1850034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850034" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12666", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12666" } ], "release_date": "2020-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3369" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "macaron: open redirect in the static handler" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3369" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.10.redhat2-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:ior-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-13.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.6-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.6-1.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-14.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.6-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2020_3665
Vulnerability from csaf_redhat
Published
2020-09-08 10:05
Modified
2024-09-18 04:26
Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3665", "url": "https://access.redhat.com/errata/RHSA-2020:3665" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_3665.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security update", "tracking": { "current_release_date": "2024-09-18T04:26:19+00:00", "generator": { "date": "2024-09-18T04:26:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:3665", "initial_release_date": "2020-09-08T10:05:46+00:00", "revision_history": [ { "date": "2020-09-08T10:05:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-09-08T10:05:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:26:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8020020200817154239:02f7cb7a", "product": { "name": "go-toolset:rhel8:8020020200817154239:02f7cb7a", "product_id": "go-toolset:rhel8:8020020200817154239:02f7cb7a", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8020020200817154239:02f7cb7a" } } }, { "category": "product_version", "name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product": { "name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_id": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product": { "name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_id": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product": { "name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_id": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product": { "name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_id": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "product": { "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=src" } } }, { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product": { "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product": { "name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_id": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product": { "name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_id": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product": { "name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_id": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, "product_reference": "go-toolset:rhel8:8020020200817154239:02f7cb7a", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src" }, "product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64" }, "product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64" }, "product_reference": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64" }, "product_reference": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64" }, "product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le" }, "product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x" }, "product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64" }, "product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" }, "product_reference": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" }, "product_reference": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64" }, "product_reference": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" }, "product_reference": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" }, "product_reference": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3665" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3665" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3665" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_4297
Vulnerability from csaf_redhat
Published
2020-10-27 14:53
Modified
2024-09-18 04:27
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.6.1 package security update
Notes
Topic
An update for jenkins-2-plugins, openshift-clients, podman, runc, and skopeo is now available for Red Hat OpenShift Container Platform 4.6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* jenkins-jira-plugin: plugin information disclosure (CVE-2019-16541)
* jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM (CVE-2020-2252)
* jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files (CVE-2020-2254)
* jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests. (CVE-2020-2255)
* kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 (CVE-2020-8564)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for jenkins-2-plugins, openshift-clients, podman, runc, and skopeo is now available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nThe runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.\n\nThe skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* jenkins-jira-plugin: plugin information disclosure (CVE-2019-16541)\n\n* jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM (CVE-2020-2252)\n\n* jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files (CVE-2020-2254)\n\n* jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests. (CVE-2020-2255)\n\n* kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4 (CVE-2020-8564)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4297", "url": "https://access.redhat.com/errata/RHSA-2020:4297" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1819663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1874268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268" }, { "category": "external", "summary": "1880454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454" }, { "category": "external", "summary": "1880456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456" }, { "category": "external", "summary": "1880460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460" }, { "category": "external", "summary": "1886637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_4297.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.1 package security update", "tracking": { "current_release_date": "2024-09-18T04:27:09+00:00", "generator": { "date": "2024-09-18T04:27:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:4297", "initial_release_date": "2020-10-27T14:53:57+00:00", "revision_history": [ { "date": "2020-10-27T14:53:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-27T14:53:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:27:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.9.3-3.rhaos4.6.el8.src", "product": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.src", "product_id": "podman-0:1.9.3-3.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src", "product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "product": { "name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "product_id": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@1.9.3-3.rhaos4.6.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src" }, "product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch" }, "product_reference": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16541", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2019-11-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819663" } ], "notes": [ { "category": "description", "text": "Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-jira-plugin: plugin information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16541" }, { "category": "external", "summary": "RHBZ#1819663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16541", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541" }, { "category": "external", "summary": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106", "url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-jira-plugin: plugin information disclosure" }, { "cve": "CVE-2020-2252", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2020-09-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1880454" } ], "notes": [ { "category": "description", "text": "Jenkins Mailer Plugin 1.32 and earlier does not perform hostname validation when connecting to the configured SMTP server.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2252" }, { "category": "external", "summary": "RHBZ#1880454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2252", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813", "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3", "url": "https://www.openwall.com/lists/oss-security/2020/09/16/3" } ], "release_date": "2020-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM" }, { "cve": "CVE-2020-2254", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1880456" } ], "notes": [ { "category": "description", "text": "Jenkins Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag that, when enabled, allows an attacker with Job/Configure or Job/Create permission to read arbitrary files on the Jenkins controller file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2254" }, { "category": "external", "summary": "RHBZ#1880456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2254", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956", "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956" } ], "release_date": "2020-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files" }, { "cve": "CVE-2020-2255", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2020-09-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1880460" } ], "notes": [ { "category": "description", "text": "A missing permission check in Jenkins Blue Ocean Plugin 1.23.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2255" }, { "category": "external", "summary": "RHBZ#1880460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2255", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2255" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961", "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3", "url": "https://www.openwall.com/lists/oss-security/2020/09/16/3" } ], "release_date": "2020-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests." }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Nikolaos Moraitis" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8564", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886637" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8564" }, { "category": "external", "summary": "RHBZ#1886637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8564", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95622", "url": "https://github.com/kubernetes/kubernetes/issues/95622" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-14370", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-07-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874268" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in containers/podman. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container leak into subsequent containers. This flaw allows an attacker who controls the subsequent containers to gain access to sensitive information stored in such variables. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst OpenShift Container Platform (OCP) does include podman, the Varlink API is not enabled by default. However, as it is trivial to activate this feature, OCP has been marked as affected.\n\nOCP 3.11 has previously packaged podman, but instead now relies on the version from rhel-extra.The older version previously packaged is not vulnerable to this CVE and hence has been marked not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14370" }, { "category": "external", "summary": "RHBZ#1874268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14370", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370" } ], "release_date": "2020-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_3783
Vulnerability from csaf_redhat
Published
2020-09-22 07:15
Modified
2020-09-22 07:15
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.4.23 cluster-network-operator-container security update
Notes
Topic
An update for cluster-network-operator-container is now available for Red Hat OpenShift Container Platform 4.4.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Container Platform components are primarily written in Go
(golang).
The golang.org/x/text contains text-related packages which are used for
text operations, such as character encodings, text transformations, and
locale-specific text handling.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cluster-network-operator-container is now available for Red Hat OpenShift Container Platform 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Container Platform components are primarily written in Go\n(golang).\nThe golang.org/x/text contains text-related packages which are used for\ntext operations, such as character encodings, text transformations, and\nlocale-specific text handling.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3783", "url": "https://access.redhat.com/errata/RHSA-2020:3783" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_3783.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.4.23 cluster-network-operator-container security update", "tracking": { "current_release_date": "2020-09-22T07:15:00Z", "generator": { "date": "2023-07-01T04:06:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2020:3783", "initial_release_date": "2020-09-22T07:15:00Z", "revision_history": [ { "date": "2020-09-22T07:15:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.4", "product": { "name": "Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.4::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator:v4.4.0-202009120105.p0", "product": { "name": "openshift4/ose-cluster-network-operator:v4.4.0-202009120105.p0", "product_id": "openshift4/ose-cluster-network-operator:v4.4.0-202009120105.p0" } } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator:v4.4.0-202009120105.p0 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift4/ose-cluster-network-operator:v4.4.0-202009120105.p0" }, "product_reference": "openshift4/ose-cluster-network-operator:v4.4.0-202009120105.p0", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.4:openshift4/ose-cluster-network-operator:v4.4.0-202009120105.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" }, { "category": "external", "summary": "CVE-2020-14040", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "bz#1853652: CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "release_date": "2020-06-17T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.4:openshift4/ose-cluster-network-operator:v4.4.0-202009120105.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:3783" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.4:openshift4/ose-cluster-network-operator:v4.4.0-202009120105.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2020_5605
Vulnerability from csaf_redhat
Published
2020-12-17 19:42
Modified
2024-09-18 04:27
Summary
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement update
Notes
Topic
Updated images are now available for Red Hat OpenShift Container Storage 4.6.0 on Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
These updated images include numerous security fixes, bug fixes, and enhancements.
Security Fix(es):
* nodejs-node-forge: prototype pollution via the util.setPath function (CVE-2020-7720)
* nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS (CVE-2020-8237)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Users are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index
All Red Hat OpenShift Container Storage users are advised to upgrade to
these updated images.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images are now available for Red Hat OpenShift Container Storage 4.6.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated images include numerous security fixes, bug fixes, and enhancements. \n\nSecurity Fix(es):\n\n* nodejs-node-forge: prototype pollution via the util.setPath function (CVE-2020-7720)\n\n* nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS (CVE-2020-8237)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUsers are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to\nthese updated images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5605", "url": "https://access.redhat.com/errata/RHSA-2020:5605" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1806266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806266" }, { "category": "external", "summary": "1813506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813506" }, { "category": "external", "summary": "1817438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817438" }, { "category": "external", "summary": "1817850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817850" }, { "category": "external", "summary": "1827157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827157" }, { "category": "external", "summary": "1829055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1829055" }, { "category": "external", "summary": "1833153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833153" }, { "category": "external", "summary": "1836299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836299" }, { "category": "external", "summary": "1842254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842254" }, { "category": "external", "summary": "1845976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845976" }, { "category": "external", "summary": "1849771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849771" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1854500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854500" }, { "category": "external", "summary": "1854501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854501" }, { "category": "external", "summary": "1854503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854503" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1858195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858195" }, { "category": "external", "summary": "1859183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859183" }, { "category": "external", "summary": "1859229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859229" }, { "category": "external", "summary": "1859478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859478" }, { "category": "external", "summary": "1860022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860022" }, { "category": "external", "summary": "1860034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860034" }, { "category": "external", "summary": "1860670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860670" }, { "category": "external", "summary": "1860848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860848" }, { "category": "external", "summary": "1861780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861780" }, { "category": "external", "summary": "1865938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865938" }, { "category": "external", "summary": "1867024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867024" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1868060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868060" }, { "category": "external", "summary": "1868703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868703" }, { "category": "external", "summary": "1869411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869411" }, { "category": "external", "summary": "1870061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870061" }, { "category": "external", "summary": "1870338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870338" }, { "category": "external", "summary": "1870631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870631" }, { "category": "external", "summary": "1872119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872119" }, { "category": "external", "summary": "1872696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872696" }, { "category": "external", "summary": "1873864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873864" }, { "category": "external", "summary": "1874606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606" }, { "category": "external", "summary": "1875476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875476" }, { "category": "external", "summary": "1877339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877339" }, { "category": "external", "summary": "1877371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877371" }, { "category": "external", "summary": "1878153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878153" }, { "category": "external", "summary": "1878714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878714" }, { "category": "external", "summary": "1878853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878853" }, { "category": "external", "summary": "1879008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879008" }, { "category": "external", "summary": "1879072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879072" }, { "category": "external", "summary": "1879919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879919" }, { "category": "external", "summary": "1880255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880255" }, { "category": "external", "summary": "1881028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028" }, { "category": "external", "summary": "1881071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881071" }, { "category": "external", "summary": "1882397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882397" }, { "category": "external", "summary": "1883253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883253" }, { "category": "external", "summary": "1883398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883398" }, { "category": "external", "summary": "1883767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883767" }, { "category": "external", "summary": "1883810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883810" }, { "category": "external", "summary": "1883927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883927" }, { "category": "external", "summary": "1885175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885175" }, { "category": "external", "summary": "1885428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885428" }, { "category": "external", "summary": "1885648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885648" }, { "category": "external", "summary": "1885971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885971" }, { "category": "external", "summary": "1886308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886308" }, { "category": "external", "summary": "1886348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886348" }, { "category": "external", "summary": "1886551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886551" }, { "category": "external", "summary": "1886709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886709" }, { "category": "external", "summary": "1886859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886859" }, { "category": "external", "summary": "1886873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886873" }, { "category": "external", "summary": "1888583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888583" }, { "category": "external", "summary": "1888593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888593" }, { "category": "external", "summary": "1888614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888614" }, { "category": "external", "summary": "1889441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889441" }, { "category": "external", "summary": "1889683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889683" }, { "category": "external", "summary": "1889866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889866" }, { "category": "external", "summary": "1890183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890183" }, { "category": "external", "summary": "1890638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890638" }, { "category": "external", "summary": "1890971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890971" }, { "category": "external", "summary": "1891856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891856" }, { "category": "external", "summary": "1892206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892206" }, { "category": "external", "summary": "1892234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892234" }, { "category": "external", "summary": "1893624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893624" }, { "category": "external", "summary": "1893691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893691" }, { "category": "external", "summary": "1893714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893714" }, { "category": "external", "summary": "1895402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895402" }, { "category": "external", "summary": "1896298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896298" }, { "category": "external", "summary": "1896831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896831" }, { "category": "external", "summary": "1898521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898521" }, { "category": "external", "summary": "1902627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902627" }, { "category": "external", "summary": "1904171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904171" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_5605.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement update", "tracking": { "current_release_date": "2024-09-18T04:27:51+00:00", "generator": { "date": "2024-09-18T04:27:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:5605", "initial_release_date": "2020-12-17T19:42:16+00:00", "revision_history": [ { "date": "2020-12-17T19:42:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-12-17T19:42:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:27:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product": { "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Storage" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "product": { "name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "product_id": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "product": { "name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "product_id": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "product_id": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "product": { "name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "product_id": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "product_id": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "product": { "name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "product_id": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "product": { "name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "product_id": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "product_id": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "product": { "name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "product_id": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "product_id": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "product": { "name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "product_id": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "product": { "name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "product_id": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "product_id": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "product": { "name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "product_id": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "product_id": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7720", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-09-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874606" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-node-forge. A Prototype Pollution via the util.setPath function is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-node-forge: prototype pollution via the util.setPath function", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of node-forge as a dependency of google-p12-pem, however the vulnerable function `util.setPath` is not being used and hence this issue has been rated as having a security impact of Low.\n\nIn OpenShift Container Platform (OCP) the prometheus container is behind OpenShift OAuth restricting access to the vulnerable node-forge library to authenticated users only, therefore the impact is Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7720" }, { "category": "external", "summary": "RHBZ#1874606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7720", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677", "url": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677" } ], "release_date": "2020-09-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-node-forge: prototype pollution via the util.setPath function" }, { "cve": "CVE-2020-8237", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-09-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881028" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-json-bigint. A Prototype pollution in json-bigint npm may lead to a denial-of-service (DoS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of json-bigint as a dependency of googleapis, however the json-bigint library is not being used and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8237" }, { "category": "external", "summary": "RHBZ#1881028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8237", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8237" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237" }, { "category": "external", "summary": "https://hackerone.com/reports/916430", "url": "https://hackerone.com/reports/916430" } ], "release_date": "2020-08-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2021_0980
Vulnerability from csaf_redhat
Published
2021-03-24 15:39
Modified
2024-09-18 04:28
Summary
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.5 security and bug fix update
Notes
Topic
Red Hat Advanced Cluster Management for Kubernetes 2.1.5 General
Availability release images, which fix several bugs and security issues.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat Advanced Cluster Management for Kubernetes 2.1.5 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.1/html/release_notes/
Security fix:
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug fixes:
* Overview page not showing pods count of the cluster (BZ#1903446)
* On new Application deployment, Ansible Prehook gets executed twice (BZ#1920654)
* Go panic in multicluster-operators-hub pods when creating a helm subscription using basic auth (BZ#1925281)
* RHACM 2.1.5 images (BZ#1931887)
* CVE-2020-14040 grafana-dashboard-loader: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2] (BZ#1932356)
* CVE-2020-14040 multicluster-monitoring-operator: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2] (BZ#1932359)
* RHACM missing Canadian regions for Azure Provider (BZ#1932430)
* CVE-2020-14040 configmap-watcher: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932481)
* CVE-2020-14040 governance-policy-status-sync: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932498)
* CVE-2020-14040 governance-policy-template-sync: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932617)
* CVE-2020-14040 governance-policy-spec-sync: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932633)
* CVE-2020-14040 multicloudhub-operator: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932665)
* CVE-2020-14040 multicloudhub-repo: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932668)
* CVE-2020-14040 config-policy-controller: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933062)
* CVE-2020-14040 cert-manager: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933073)
* CVE-2020-14040 cert-policy-controller: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933104)
* CVE-2020-14040 iam-policy-controller: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933106)
* CVE-2020-14040 management-ingress: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933136)
* CVE-2020-14040 governance-policy-propagator: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1938355)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.1.5 General\nAvailability release images, which fix several bugs and security issues. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.1.5 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs and security issues. See\nthe following Release Notes documentation, which will be updated shortly \nfor this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.1/html/release_notes/\n\nSecurity fix:\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue, including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nBug fixes:\n\n* Overview page not showing pods count of the cluster (BZ#1903446)\n\n* On new Application deployment, Ansible Prehook gets executed twice (BZ#1920654)\n\n* Go panic in multicluster-operators-hub pods when creating a helm subscription using basic auth (BZ#1925281)\n\n* RHACM 2.1.5 images (BZ#1931887)\n\n* CVE-2020-14040 grafana-dashboard-loader: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2] (BZ#1932356)\n\n* CVE-2020-14040 multicluster-monitoring-operator: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2] (BZ#1932359)\n\n* RHACM missing Canadian regions for Azure Provider (BZ#1932430)\n\n* CVE-2020-14040 configmap-watcher: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932481)\n\n* CVE-2020-14040 governance-policy-status-sync: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932498)\n\n* CVE-2020-14040 governance-policy-template-sync: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932617)\n\n* CVE-2020-14040 governance-policy-spec-sync: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932633) \n\n* CVE-2020-14040 multicloudhub-operator: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932665)\n\n* CVE-2020-14040 multicloudhub-repo: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1932668)\n\n* CVE-2020-14040 config-policy-controller: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933062)\n\n* CVE-2020-14040 cert-manager: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933073)\n\n* CVE-2020-14040 cert-policy-controller: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933104)\n\n* CVE-2020-14040 iam-policy-controller: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933106)\n\n* CVE-2020-14040 management-ingress: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1933136)\n\n* CVE-2020-14040 governance-policy-propagator: golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash [rhacm-2.1] (BZ#1938355)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0980", "url": "https://access.redhat.com/errata/RHSA-2021:0980" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2020-14040", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1903446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903446" }, { "category": "external", "summary": "1920654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920654" }, { "category": "external", "summary": "1925281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925281" }, { "category": "external", "summary": "1931887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931887" }, { "category": "external", "summary": "1932430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932430" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0980.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.5 security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:28:01+00:00", "generator": { "date": "2024-09-18T04:28:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0980", "initial_release_date": "2021-03-24T15:39:52+00:00", "revision_history": [ { "date": "2021-03-24T15:39:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-24T15:39:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:28:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.1 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-RHACM-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.1::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.1.3-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564_amd64", "relates_to_product_reference": "8Base-RHACM-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.1/html/install/installing#upgrading-by-using-the-operator", "product_ids": [ "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0980" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:0b5db239e2eee0bc73f60910953a16b3abd4e2823d55f6fcfbc3f1d4fadbe564_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2021_1168
Vulnerability from csaf_redhat
Published
2021-04-13 04:30
Modified
2024-09-18 04:28
Summary
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.2 security and bug fix update
Notes
Topic
Red Hat Advanced Cluster Management for Kubernetes 2.2.2 General Availability release images, which fix several bugs and security issues.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Advanced Cluster Management for Kubernetes 2.2.2 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/
Security Fix(es):
* fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321)
* fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21322)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* go-slug: partial protection against zip slip attacks (CVE-2020-29529)
* nodejs-lodash: command injection via template (CVE-2021-23337)
* openssl: integer overflow in CipherUpdate (CVE-2021-23840)
* openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Documentation is referencing deprecated API for Service Export - Submariner (BZ#1936528)
* Importing of cluster fails due to error/typo in generated command (BZ#1936642)
* RHACM 2.2.2 images (BZ#1938215)
* 2.2 clusterlifecycle fails to allow provision `fips: true` clusters on aws, vsphere (BZ#1941778)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.2.2 General Availability release images, which fix several bugs and security issues. \n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.2.2 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/\n\nSecurity Fix(es):\n\n* fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321)\n\n* fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21322)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n\n* go-slug: partial protection against zip slip attacks (CVE-2020-29529)\n\n* nodejs-lodash: command injection via template (CVE-2021-23337)\n\n* openssl: integer overflow in CipherUpdate (CVE-2021-23840)\n\n* openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Documentation is referencing deprecated API for Service Export - Submariner (BZ#1936528)\n\n* Importing of cluster fails due to error/typo in generated command (BZ#1936642)\n\n* RHACM 2.2.2 images (BZ#1938215)\n\n* 2.2 clusterlifecycle fails to allow provision `fips: true` clusters on aws, vsphere (BZ#1941778)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1168", "url": "https://access.redhat.com/errata/RHSA-2021:1168" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "1914238", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914238" }, { "category": "external", "summary": "1928937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928937" }, { "category": "external", "summary": "1928954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928954" }, { "category": "external", "summary": "1930310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310" }, { "category": "external", "summary": "1930324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324" }, { "category": "external", "summary": "1936528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936528" }, { "category": "external", "summary": "1936642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936642" }, { "category": "external", "summary": "1938215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1938215" }, { "category": "external", "summary": "1941778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941778" }, { "category": "external", "summary": "1942178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942178" }, { "category": "external", "summary": "1942182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942182" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_1168.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.2 security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:28:16+00:00", "generator": { "date": "2024-09-18T04:28:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:1168", "initial_release_date": "2021-04-13T04:30:02+00:00", "revision_history": [ { "date": "2021-04-13T04:30:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-13T04:30:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:28:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.2::el8" } } }, { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 7", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 7", "product_id": "7Server-RHACM-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.2::el7" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "product": { "name": "rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "product_id": "rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "product_identification_helper": { "purl": "pkg:oci/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acmesolver-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.2.2-18" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "product": { "name": "rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "product_id": "rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.2.2-6" } } }, { "category": "product_version", "name": "rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "product": { "name": "rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "product_id": "rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "product_identification_helper": { "purl": "pkg:oci/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cainjector-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "product": { "name": "rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "product_id": "rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-manager-controller-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "product": { "name": "rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "product_id": "rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-manager-webhook-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.2.2-5" } } }, { "category": "product_version", "name": "rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "product": { "name": "rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "product_id": "rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "product_identification_helper": { "purl": "pkg:oci/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/configmap-watcher-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "product": { "name": "rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "product_id": "rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.2.2-6" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "product_id": "rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.2.2-6" } } }, { "category": "product_version", "name": "rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "product": { "name": "rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "product_id": "rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "product_identification_helper": { "purl": "pkg:oci/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-header-rhel8\u0026tag=v2.2.2-5" } } }, { "category": "product_version", "name": "rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "product": { "name": "rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "product_id": "rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-component-rhel8-operator\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "product": { "name": "rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "product_id": "rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-rhel8-operator\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.2.2-5" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.2.2-5" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "product_id": "rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.2.2-6" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "product": { "name": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "product_id": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-lease-controller-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "product": { "name": "rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "product_id": "rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-operator-bundle\u0026tag=v2.2.2-14" } } }, { "category": "product_version", "name": "rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "product": { "name": "rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "product_id": "rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "product_identification_helper": { "purl": "pkg:oci/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kui-web-terminal-rhel8\u0026tag=v2.2.2-6" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "product": { "name": "rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "product_id": "rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel7\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "product": { "name": "rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "product_id": "rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "product_identification_helper": { "purl": "pkg:oci/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/mcm-topology-api-rhel8\u0026tag=v2.2.2-5" } } }, { "category": "product_version", "name": "rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "product": { "name": "rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "product_id": "rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "product_identification_helper": { "purl": "pkg:oci/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/mcm-topology-rhel8\u0026tag=v2.2.2-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "product_id": "rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel7\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.2.2-5" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.2.2-15" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.2.2-6" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.2.2-7" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "product": { "name": "rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "product_id": "rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel7\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "product": { "name": "rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "product_id": "rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "product_identification_helper": { "purl": "pkg:oci/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rcm-controller-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "product": { "name": "rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "product_id": "rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "product_id": "rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "product": { "name": "rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "product_id": "rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel7\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "product_id": "rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "product": { "name": "rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "product_id": "rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "product": { "name": "rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "product_id": "rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel7\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64", "product": { "name": "rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64", "product_id": "rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.2.2-3" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "product": { "name": "rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "product_id": "rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-component-rhel8-operator\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.2.2-5" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "product": { "name": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "product_id": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-lease-controller-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.2.2-5" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.2.2-7" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "product": { "name": "rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "product_id": "rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "product_id": "rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.2.2-3" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.2.2-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "product": { "name": "rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "product_id": "rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.2.2-3" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 7", "product_id": "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64" }, "product_reference": "rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "relates_to_product_reference": "7Server-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 7", "product_id": "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "relates_to_product_reference": "7Server-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 7", "product_id": "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64" }, "product_reference": "rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "relates_to_product_reference": "7Server-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 7", "product_id": "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "relates_to_product_reference": "7Server-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 7", "product_id": "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64" }, "product_reference": "rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "relates_to_product_reference": "7Server-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64" }, "product_reference": "rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64" }, "product_reference": "rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64" }, "product_reference": "rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64" }, "product_reference": "rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64" }, "product_reference": "rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64" }, "product_reference": "rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64" }, "product_reference": "rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64" }, "product_reference": "rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x" }, "product_reference": "rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64" }, "product_reference": "rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64" }, "product_reference": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x" }, "product_reference": "rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64" }, "product_reference": "rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64" }, "product_reference": "rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64" }, "product_reference": "rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64" }, "product_reference": "rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64" }, "product_reference": "rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x" }, "product_reference": "rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64" }, "product_reference": "rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x" }, "product_reference": "rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "relates_to_product_reference": "8Base-RHACM-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.2 for RHEL 8", "product_id": "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" }, "product_reference": "rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64", "relates_to_product_reference": "8Base-RHACM-2.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-28500", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928954" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-lodash. A Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-lodash library to authenticated users only, therefore the impact is low.\n\nWhile Red Hat Virtualization\u0027s cockpit-ovirt has a dependency on lodash it doesn\u0027t use the vulnerable toNumber, trim, or trimEnd functions.\n\nWhile Red Hat Quay has a dependency on lodash via restangular it doesn\u0027t use the vulnerable toNumber, trim, or trimEnd functions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28500" }, { "category": "external", "summary": "RHBZ#1928954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928954" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28500", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28500" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-LODASH-1018905", "url": "https://snyk.io/vuln/SNYK-JS-LODASH-1018905" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions" }, { "cve": "CVE-2020-28851", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913333" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28851" }, { "category": "external", "summary": "RHBZ#1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension" }, { "cve": "CVE-2020-28852", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913338" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28852" }, { "category": "external", "summary": "RHBZ#1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag" }, { "cve": "CVE-2020-29529", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2020-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1914238" } ], "notes": [ { "category": "description", "text": "HashiCorp go-slug up to 0.4.3 did not fully protect against directory traversal while unpacking tar archives, and protections could be bypassed with specific constructions of multiple symlinks. Fixed in 0.5.0.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-slug: partial protection against zip slip attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29529" }, { "category": "external", "summary": "RHBZ#1914238", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914238" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29529", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29529" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29529", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29529" } ], "release_date": "2020-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go-slug: partial protection against zip slip attacks" }, { "cve": "CVE-2021-21321", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1942178" } ], "notes": [ { "category": "description", "text": "A flaw was found in fastify-reply-from. Escaping of the prefix of the proxied backend service is possible allowing an attacker, using a specially crafted URL, to gain access to directories that would otherwise be out of bounds. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "fastify-reply-from: crafted URL allows prefix scape of the proxied backend service", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact of this flaw largely depends on the environment where the affected library is being used. This flaw could be used to redirect an adversary to an exposed, unprotected endpoint. Depending on the functionality of the affected endpoint that could result in a loss of confidentiality, integrity and availability. The severity of this flaw in for Red Had Advanced Cluster Management for Kubernetes is rated as important as there are no exposed, un-authenticated endpoints that could be accessed by exploiting this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21321" }, { "category": "external", "summary": "RHBZ#1942178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942178" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21321", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21321" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21321", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21321" }, { "category": "external", "summary": "https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4", "url": "https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4" } ], "release_date": "2021-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "fastify-reply-from: crafted URL allows prefix scape of the proxied backend service" }, { "cve": "CVE-2021-21322", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1942182" } ], "notes": [ { "category": "description", "text": "A flaw was found in fastify-http-proxy. Escaping the prefix of the proxied backend service is possible by an attacker using a specially crafted URL. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact of this flaw largely depends on the environment where the affected library is being used. This flaw could be used to redirect an adversary to an exposed, unprotected endpoint. Depending on the functionality of the affected endpoint that could result in a loss of confidentiality, integrity and availability. The severity of this flaw in for Red Had Advanced Cluster Management for Kubernetes is rated as important as there are no exposed, un-authenticated endpoints that could be accessed by exploiting this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21322" }, { "category": "external", "summary": "RHBZ#1942182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942182" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21322", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21322" }, { "category": "external", "summary": "https://github.com/fastify/fastify-http-proxy/security/advisories/GHSA-c4qr-gmr9-v23w", "url": "https://github.com/fastify/fastify-http-proxy/security/advisories/GHSA-c4qr-gmr9-v23w" } ], "release_date": "2021-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service" }, { "cve": "CVE-2021-23337", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "discovery_date": "2021-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928937" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-lodash. A command injection flaw is possible through template variables.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-lodash: command injection via template", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-lodash library to authenticated users only, therefore the impact is low.\n\nWhile Red Hat Virtualization\u0027s cockpit-ovirt has a dependency on lodash it doesn\u0027t use the vulnerable template function.\n\nWhile Red Hat Quay has a dependency on lodash via restangular it doesn\u0027t use the vulnerable template function.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23337" }, { "category": "external", "summary": "RHBZ#1928937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23337", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23337" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-LODASH-1040724", "url": "https://snyk.io/vuln/SNYK-JS-LODASH-1040724" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-lodash: command injection via template" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930324" } ], "notes": [ { "category": "description", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: integer overflow in CipherUpdate", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects applications which are compiled with OpenSSL and using EVP_CipherUpdate, EVP_EncryptUpdate or EVP_DecryptUpdate functions. When specially-crafted values are passed to these functions, it can cause the application to crash or behave incorrectly.\n\nOpenSSL in Red Hat Enterprise Linux 9 was marked as not affected as its already fixed in RHEL9 Alpha release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23840" }, { "category": "external", "summary": "RHBZ#1930324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23840", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: integer overflow in CipherUpdate" }, { "cve": "CVE-2021-23841", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930310" } ], "notes": [ { "category": "description", "text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a a null pointer dereference in the X509_issuer_and_serial_hash() function, which can result in crash if called by an application compiled with OpenSSL, by passing a specially-crafted certificate. OpenSSL internally does not use this function.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23841" }, { "category": "external", "summary": "RHBZ#1930310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23841", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1168" }, { "category": "workaround", "details": "As per upstream \"The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources.\"", "product_ids": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHACM-2.2:rhacm2/management-ingress-rhel7@sha256:f6b57ccc9f8c7f3dc2476c0336a1e85a0878ae4dd5493172e6610dc639bf3711_amd64", "7Server-RHACM-2.2:rhacm2/memcached-exporter-rhel7@sha256:8e2196bdbeb0ceae5b3003f52c1c71968e630aba3c69ba241bb5e64402c97f03_amd64", "7Server-RHACM-2.2:rhacm2/openshift-hive-rhel7@sha256:6e10254a7ec99ddec5f366a2b69910917bafc6782c6e01d033ad406aab3c4ab0_amd64", "7Server-RHACM-2.2:rhacm2/search-aggregator-rhel7@sha256:023e8b5dfd7b286ce4b7622acfe21093cb5749236d5504ed2cb9a967d03009f3_amd64", "7Server-RHACM-2.2:rhacm2/thanos-rhel7@sha256:53b80b01a35f227f530c1b088caee1806bd73319f8ac7950f79cc21963e68a4d_amd64", "8Base-RHACM-2.2:rhacm2/acm-must-gather-rhel8@sha256:81ebaf38c0840ba4001cc914e425117230c990b14277eb46d5a97a0acff600d4_amd64", "8Base-RHACM-2.2:rhacm2/acm-operator-bundle@sha256:82f8508111f307c25e458a2283e86a21eaeeaa2cd0b335766174f324f6bd392d_amd64", "8Base-RHACM-2.2:rhacm2/acmesolver-rhel8@sha256:f639a4d14d4c6015921d8813a4f3808ceb0d7f691c199a3fa4c197bf13030637_amd64", "8Base-RHACM-2.2:rhacm2/application-ui-rhel8@sha256:21f1904a812ebc43b5e31177eabaa5a92bcb97a28b55a14557ccbee7673825f6_amd64", "8Base-RHACM-2.2:rhacm2/cainjector-rhel8@sha256:874937f7c8c08fadc4ef2f45f1d0721c3fd2744b27207b28e313646f69bf4dad_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-controller-rhel8@sha256:c2bbaf9c0120351bbf84aae52b3b61d23258c10f90cb7c2b562ba3580f208d6d_amd64", "8Base-RHACM-2.2:rhacm2/cert-manager-webhook-rhel8@sha256:a869fcc065604fd2e164e80e5829894b0b47396e358357567839fcae2758f4d0_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:0e16a0575a63d09a53296072b0ad989c3fa9426303d16e1ddd19beda95ff916f_amd64", "8Base-RHACM-2.2:rhacm2/cert-policy-controller-rhel8@sha256:1b250e2dd5ff3e9e90cae26f1b6ecc2369381cb7aaed171ed245b28838ddfdd8_s390x", "8Base-RHACM-2.2:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:7e147468cac7bc5faa3f7f93ee5a1adbb22b06878c662975bf5e70f6221c1efa_amd64", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:1288f38b70a158889d31643af7f827f41b369f6b4f94d727e34635c8d1eec06c_s390x", "8Base-RHACM-2.2:rhacm2/config-policy-controller-rhel8@sha256:93ecc069ebff07d5a528b844aeb1e54d64528dfeb444f89605aed13fa284423b_amd64", "8Base-RHACM-2.2:rhacm2/configmap-watcher-rhel8@sha256:78a3aee6ef65826d88fc50f25bf8aa29d04d17e8d1647b240818422f82ce8b6e_amd64", "8Base-RHACM-2.2:rhacm2/console-api-rhel8@sha256:504c7639ffb280982d7198ae7317c5e4aa2926f74143d28e9191767874ff96ed_amd64", "8Base-RHACM-2.2:rhacm2/console-header-rhel8@sha256:bde030b82bdea58cc3d8c42a74b4dfb4a080e9e590571db3e3bd528d859848d1_amd64", "8Base-RHACM-2.2:rhacm2/console-rhel8@sha256:6f573213d8b3c4643a23f520c6277bbc0d8605774088973c261aaf2bf27850e9_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:01b65937ba5d14fee077252a8ef82c5b6077d06b8d29caf23726b2db560dde5b_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-component-rhel8-operator@sha256:694dadf21771b2b13c027210947b51e73edc92447c9fb28329278cc5ea117bfc_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:1159f9e7cfa21e2b213cd508009132fbafe0dfc66cf3a1c0a405d6ecb5038084_s390x", "8Base-RHACM-2.2:rhacm2/endpoint-monitoring-rhel8-operator@sha256:5fea99154a48d4a8362f9462cd48b3ac7f240dfe2c2345b51a8ea9db0dc11615_amd64", "8Base-RHACM-2.2:rhacm2/endpoint-rhel8-operator@sha256:557e4578f4d7860a13285be8b6886ed57f7008bdfb2de394c67504b064f71cf8_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-propagator-rhel8@sha256:3144e1fae6331a0c4b4e8832ed4004e5285d40868a798c50bf62c519a2144200_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:1ab6f5ec3a9a20e7c43c0015144eb4187b68e1adc169822dd375426939992545_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-spec-sync-rhel8@sha256:9e70343fa527e8d91c343b85681f0308f2a5338d7ea9d94e03c5dd81035ac13c_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:52e261947059a2a8b298fa486db54293038812d4178b1cc9081d043e3366df50_amd64", "8Base-RHACM-2.2:rhacm2/governance-policy-status-sync-rhel8@sha256:97ac485778e5ebea777f642439da853278ab2b36d4e02ca75688f0b6a1cca6c8_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:834e87d0d55dc7a63289fb8b70d497527f58ca5ab53055cbfcdb7791203dc37e_s390x", "8Base-RHACM-2.2:rhacm2/governance-policy-template-sync-rhel8@sha256:af6c476c593d1db817c1cffd81fe7c306bb32804d75eb07af16e90b79e485c2b_amd64", "8Base-RHACM-2.2:rhacm2/grafana-dashboard-loader-rhel8@sha256:bbeb9ea3ce8eeabf3e2bb8efac93ffe97fd945b7f5a7c29ace2376ca51ea0bcc_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-api-rhel8@sha256:44ba8196f14e6edf4b9b3815a1e0d7834acc37394d27402a9261a36ca067736e_amd64", "8Base-RHACM-2.2:rhacm2/grc-ui-rhel8@sha256:8590ac50762b5f42a6a6ed09cf85492cd3c2bc50e03b3d38e55e0ed66a8330da_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:12a2e3b481e8c315b28745a5f4a0e03a10456d8dd8df2cf52e33737af04e5443_amd64", "8Base-RHACM-2.2:rhacm2/iam-policy-controller-rhel8@sha256:7da3f12fc77185e9bbf217158140d865cee78bc90c606e789c8a7716cd27196c_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:297dd2dddc4fb516d60cf69daeb29dcb9aaaad3dede20058f88989dc34bb2953_amd64", "8Base-RHACM-2.2:rhacm2/klusterlet-addon-lease-controller-rhel8@sha256:d86cf4bf4e1d740ceafb3b71f1f480e92dc185eb452871fc5b0b5bddf6c0fe0a_s390x", "8Base-RHACM-2.2:rhacm2/klusterlet-operator-bundle@sha256:d3b166fed222fbbcfe70e7a3872e8c1ac02a5ccd2cbf8585bedd29c005f6a16d_amd64", "8Base-RHACM-2.2:rhacm2/kui-web-terminal-rhel8@sha256:1170b40f99b150bdf38830fb6c8ac5e46d900bee13ec566f6b94be3915c83055_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-api-rhel8@sha256:15dba57df5f4bc52a698190ea0d323dc87dcc9e2c470a88e65e59b7c0cb4dc7b_amd64", "8Base-RHACM-2.2:rhacm2/mcm-topology-rhel8@sha256:8b765d1e985f88699fc7eb9ec1f05e983d7a10b7d4c4229714bcb83acfdd4c64_amd64", "8Base-RHACM-2.2:rhacm2/memcached-rhel8@sha256:fe2930ac4cd4b6062d93eb1db58d1fa64e1daae4c5a790bcb73fad5f26b066bc_amd64", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:1145552d9ff52de6421d47449d908f7d44bb8a04acab377fa1ead8e1f85842eb_s390x", "8Base-RHACM-2.2:rhacm2/metrics-collector-rhel8@sha256:731fcb93f14646e14b65c21ac40651c7221f1f1a1858c8eb88869c236c3ac94a_amd64", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7052d5ceeb35ee412ba14290d40b97830a2a70dddea363a337fe301b05d63394_s390x", "8Base-RHACM-2.2:rhacm2/multicloud-manager-rhel8@sha256:7c5274a6a747eae87c6e26e6bf887fa03eaa4e0cab7a80065bac6abf3774a65c_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-observability-rhel8-operator@sha256:a3eee2b36818af6995867280be322536a59b784194e8ed9dbf4d442c0e2d6dbe_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-application-rhel8@sha256:603aec81b2dd6115cb58f6289a99386fc4bd0a4491c52185fef713d141999011_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-channel-rhel8@sha256:660b410181b6c2202eee7689e6c1b5a30ba70d776495bb6b771f94123c589b6d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-deployable-rhel8@sha256:5ec9aaa0608e7f0c5c295680dc19be7a456aa3c6c20323fa17c89ad50a152f33_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-placementrule-rhel8@sha256:f0f7573c99355b6599a0ba4b851b8a06d19a81b706580b817afb87d06addaf40_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:179caae0e60b5dab836ceaf18271a638d5a32a1153d146100fe5842e196c8c90_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:1e61b1163a82daed57211973251c13e7eea11455672c33e7db786fcd4f223c3d_amd64", "8Base-RHACM-2.2:rhacm2/multicluster-operators-subscription-rhel8@sha256:4fb58d7e465350dbc33b2272eb35b7fcf8a8468bb4e5c3ff30f25db1202dd6d0_s390x", "8Base-RHACM-2.2:rhacm2/multiclusterhub-repo-rhel8@sha256:101156bfe0b412acfae2f079e57a6a283c4a17e0372c3150488dddf4296751d0_amd64", "8Base-RHACM-2.2:rhacm2/multiclusterhub-rhel8@sha256:805e28368aeb21ceaef8265db0e72b41a6c8b7109e8fe0c14298a389e1a0bbf8_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8-operator@sha256:c6fd0dc77f0c5d7ab30c9cd964b739f5302f6690cd2250671fe139ac514e8247_amd64", "8Base-RHACM-2.2:rhacm2/observatorium-rhel8@sha256:ee9bd32d2469ce124d8c100edaa9fd6ab399835c8a3720c7fc21aa48e1f9dfe4_amd64", "8Base-RHACM-2.2:rhacm2/rbac-query-proxy-rhel8@sha256:11c3f74245eb94130c5dad4033ac54fefe83679b5ac26a8baac39577211eefba_amd64", "8Base-RHACM-2.2:rhacm2/rcm-controller-rhel8@sha256:e94f06db14a4f0fa5fe8ffb7597147f44a7667fcc23aec1d0ef0da593e2ba02f_amd64", "8Base-RHACM-2.2:rhacm2/redisgraph-tls-rhel8@sha256:6d9c7c4cf8bd069b9d3ea172c817a0239ec9ed1f189c9e7935204aa46f6201b6_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:61ff481304633a53d931592236c9a4bc0bce30bc478e2087c7d890588d6bf1fc_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8-operator@sha256:ac8270c4fe734e29dff3067d3ca02c1b03021171c8d47b42da8a02adbe415a2a_amd64", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:389b47cab017e05d197e49a477a44e73e4b3f1dd498313bdcee86f4ac12eac06_s390x", "8Base-RHACM-2.2:rhacm2/registration-rhel8@sha256:95dd7f046b693c3524a68342a410f632dd6d574b404a4aa12a956bf6ca85fe04_amd64", "8Base-RHACM-2.2:rhacm2/search-api-rhel8@sha256:055bc6e9769da6ab142a0c8639ab34e0ffd1e154fef4e3b98c11db034864ddbf_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:2fb5172b99100acd461ebcc03baf6249834c94d37033555f2c34c143734cc451_amd64", "8Base-RHACM-2.2:rhacm2/search-collector-rhel8@sha256:89633b1d0af453c84ea7bcd07d07f4703ecf9d3c89967e24010e08fac687b13b_s390x", "8Base-RHACM-2.2:rhacm2/search-rhel8@sha256:1ed59b8ad7982fb7b1c7bfffb13051578dbae5dcd53197a725e55ddfcf3b1306_amd64", "8Base-RHACM-2.2:rhacm2/search-ui-rhel8@sha256:122d6e5374540d9b129f6e768635efa17414a5ab5a47daaabd026d9db55277c6_amd64", "8Base-RHACM-2.2:rhacm2/submariner-addon-rhel8@sha256:b27fd812c51d8312b46661b14df9af8a49eacf086ea51f03eb4536aee1d58708_amd64", "8Base-RHACM-2.2:rhacm2/thanos-receive-controller-rhel8@sha256:fb2241cb9b5f71423fcca1005685fd08a305f6f66d1bda3a3238fadca27f5433_amd64", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:927f0d6898674154c131f4fa1610e99a10c2eb09d3edb2d11decee2c3a12b10c_s390x", "8Base-RHACM-2.2:rhacm2/work-rhel8@sha256:a9aa328415bebdfaddfb776a2ddd461ba4c1bf1a9f8f82681bebf22a85a996d3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()" } ] }
rhsa-2020_3727
Vulnerability from csaf_redhat
Published
2020-09-16 07:55
Modified
2024-09-18 04:26
Summary
Red Hat Security Advisory: OpenShift Container Platform 3.11.286 security update
Notes
Topic
An update for logging-kibana5-container and openshift-enterprise-registry-container is now available for Red Hat OpenShift Container Platform 3.11.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Container Platform components are primarily written in Go
(golang). The golang.org/x/text contains text-related packages which are used for
text operations, such as character encodings, text transformations, and
locale-specific text handling.
Kibana is one of the major components of OpenShift Container Platform
cluster logging. It is a browser-based console interface to query, discover, and visualize
the log data.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* kibana: X-Frame-Option not set by default might lead to clickjacking (CVE-2020-10743)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for logging-kibana5-container and openshift-enterprise-registry-container is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Container Platform components are primarily written in Go\n(golang). The golang.org/x/text contains text-related packages which are used for\ntext operations, such as character encodings, text transformations, and\nlocale-specific text handling.\n\nKibana is one of the major components of OpenShift Container Platform\ncluster logging. It is a browser-based console interface to query, discover, and visualize\nthe log data.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* kibana: X-Frame-Option not set by default might lead to clickjacking (CVE-2020-10743)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3727", "url": "https://access.redhat.com/errata/RHSA-2020:3727" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1834550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834550" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_3727.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11.286 security update", "tracking": { "current_release_date": "2024-09-18T04:26:44+00:00", "generator": { "date": "2024-09-18T04:26:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:3727", "initial_release_date": "2020-09-16T07:55:58+00:00", "revision_history": [ { "date": "2020-09-16T07:55:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-09-16T07:55:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:26:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "product": { "name": "openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "product_id": "openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift3/ose-logging-kibana5\u0026tag=v3.11.286-1" } } }, { "category": "product_version", "name": "openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le", "product": { "name": "openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le", "product_id": "openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift3/ose-docker-registry\u0026tag=v3.11.286-1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64", "product": { "name": "openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64", "product_id": "openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78?arch=amd64\u0026repository_url=registry.redhat.io/openshift3/ose-logging-kibana5\u0026tag=v3.11.286-1" } } }, { "category": "product_version", "name": "openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "product": { "name": "openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "product_id": "openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec?arch=amd64\u0026repository_url=registry.redhat.io/openshift3/ose-docker-registry\u0026tag=v3.11.286-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64" }, "product_reference": "openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le" }, "product_reference": "openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le" }, "product_reference": "openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64" }, "product_reference": "openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10743", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-05-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1834550" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenShift Container Platform\u0027s (OCP) distribution of Kibana could open in an iframe, which made it possible to intercept and manipulate requests. This flaw allows an attacker to trick a user into performing arbitrary actions in OCP\u0027s distribution of Kibana, such as clickjacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "kibana: X-Frame-Option not set by default might lead to clickjacking", "title": "Vulnerability summary" }, { "category": "other", "text": "This CVE relates specifically to OpenShift Container Platform\u0027s distribution of Kibana. Upstream Kibana don\u0027t consider this a vulnerability, but may address this in a future version:\n\nhttps://github.com/elastic/kibana/issues/52809", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10743" }, { "category": "external", "summary": "RHBZ#1834550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834550" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10743", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10743" } ], "release_date": "2020-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the following documentation, which will be updated shortly for release\n3.11.286, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3727" }, { "category": "workaround", "details": "Any Kibana version with this commit [1] can add the following configuration option to mitigation the problem:\n\nconfig/kibana.yml:\nserver.customResponseHeaders: {\"x-frame-options\":\"deny\"}\nor\nserver.customResponseHeaders: {\"x-frame-options\":\"sameorigin\"}\n\n[1] https://github.com/elastic/kibana/pull/13045", "product_ids": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le", "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kibana: X-Frame-Option not set by default might lead to clickjacking" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:65924e84fff7fc4ace75f00b823f3412af4936066a641849aa4b3c845b25c698_ppc64le", "7Server-RH7-RHOSE-3.11:openshift3/ose-logging-kibana5@sha256:db7cd31fd03986589b2e3e618aee85edc2383f56a9ee47c175e858f99d641f78_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the following documentation, which will be updated shortly for release\n3.11.286, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:2b58d801f83a732b121c74eedee3849c2137a1a534f5737483652b25f1fc66ec_amd64", "7Server-RH7-RHOSE-3.11:openshift3/ose-docker-registry@sha256:e01939c1a1721db529b079dc80d0db7432adc96bb71678817dc688d927a9d4d7_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2020_3087
Vulnerability from csaf_redhat
Published
2020-07-22 07:33
Modified
2024-09-18 04:26
Summary
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.17.5 container images security update
Notes
Topic
An update for jaeger-all-in-one-rhel7-container, jaeger-agent-rhel7-container, jaeger-collector-rhel7-container, jaeger-query-rhel7-container, jaeger-ingester-rhel7-container and jaeger-rhel7-operator-container is now available for Jaeger-1.17.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Jaeger is Red Hat's distribution of the Jaeger project,
tailored for installation into an on-premise OpenShift Container Platform
installation.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for jaeger-all-in-one-rhel7-container, jaeger-agent-rhel7-container, jaeger-collector-rhel7-container, jaeger-query-rhel7-container, jaeger-ingester-rhel7-container and jaeger-rhel7-operator-container is now available for Jaeger-1.17.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Jaeger is Red Hat\u0027s distribution of the Jaeger project,\ntailored for installation into an on-premise OpenShift Container Platform\ninstallation.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3087", "url": "https://access.redhat.com/errata/RHSA-2020:3087" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "TRACING-1300", "url": "https://issues.redhat.com/browse/TRACING-1300" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_3087.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.17.5 container images security update", "tracking": { "current_release_date": "2024-09-18T04:26:47+00:00", "generator": { "date": "2024-09-18T04:26:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:3087", "initial_release_date": "2020-07-22T07:33:26+00:00", "revision_history": [ { "date": "2020-07-22T07:33:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-22T07:33:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:26:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Jaeger 1.17", "product": { "name": "Red Hat OpenShift Jaeger 1.17", "product_id": "7Server-RH7-JAEGER-1.17", "product_identification_helper": { "cpe": "cpe:/a:redhat:jaeger:1.17::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Jaeger" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15_amd64", "product": { "name": "distributed-tracing/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15_amd64", "product_id": "distributed-tracing/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel7\u0026tag=1.17.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad_amd64", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad_amd64", "product_id": "distributed-tracing/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel7\u0026tag=1.17.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09_amd64", "product": { "name": "distributed-tracing/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09_amd64", "product_id": "distributed-tracing/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel7\u0026tag=1.17.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9_amd64", "product": { "name": "distributed-tracing/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9_amd64", "product_id": "distributed-tracing/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel7\u0026tag=1.17.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6_amd64", "product": { "name": "distributed-tracing/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6_amd64", "product_id": "distributed-tracing/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel7\u0026tag=1.17.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428_amd64", "product": { "name": "distributed-tracing/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428_amd64", "product_id": "distributed-tracing/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel7-operator\u0026tag=1.17.5-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15_amd64" }, "product_reference": "distributed-tracing/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15_amd64", "relates_to_product_reference": "7Server-RH7-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad_amd64" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad_amd64", "relates_to_product_reference": "7Server-RH7-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09_amd64" }, "product_reference": "distributed-tracing/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09_amd64", "relates_to_product_reference": "7Server-RH7-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9_amd64" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9_amd64", "relates_to_product_reference": "7Server-RH7-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6_amd64" }, "product_reference": "distributed-tracing/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6_amd64", "relates_to_product_reference": "7Server-RH7-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428_amd64" }, "product_reference": "distributed-tracing/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428_amd64", "relates_to_product_reference": "7Server-RH7-JAEGER-1.17" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.4/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3087" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel7@sha256:6d6dfb8843465fedfaa5bc73d8b1ef0fe7d39f3e0bcb95508277ecc5bee56a15_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel7@sha256:4fa3cf137dc82aea05cf970d795f6bedd213513a114b284339299eb008ad50ad_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel7@sha256:27be7095512eab0638ec5ec06670fd5404922884fc7bcbede92a320ab821ec09_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel7@sha256:5cff6ba93d6e5a8f6853b7a5469be451383a193e85bb0505b74c94f6e50cacd9_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-query-rhel7@sha256:2a7f0915d6838ee858562a867fa57260df03704ee98b278839a731a42ace4db6_amd64", "7Server-RH7-JAEGER-1.17:distributed-tracing/jaeger-rhel7-operator@sha256:730e0015fdeab7b9ede059a1c685e003aa33463319690375c91daa22f2830428_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2020_4214
Vulnerability from csaf_redhat
Published
2020-10-08 10:52
Modified
2024-09-18 04:27
Summary
Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update
Notes
Topic
An update for go-toolset-1.13 and go-toolset-1.13-golang is now available for Red Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* net/http, x/net/http2: http server shutdown doesn't gracefully shut down HTTP2 connections (BZ#1879236)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.13 and go-toolset-1.13-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* net/http, x/net/http2: http server shutdown doesn\u0027t gracefully shut down HTTP2 connections (BZ#1879236)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4214", "url": "https://access.redhat.com/errata/RHSA-2020:4214" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/", "url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_4214.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:27:07+00:00", "generator": { "date": "2024-09-18T04:27:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:4214", "initial_release_date": "2020-10-08T10:52:13+00:00", "revision_history": [ { "date": "2020-10-08T10:52:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-08T10:52:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:27:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2020" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2020" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "product": { "name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "product_id": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "product": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "product": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-race@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-0:1.13.15-1.el7.src", "product": { "name": "go-toolset-1.13-0:1.13.15-1.el7.src", "product_id": "go-toolset-1.13-0:1.13.15-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=src" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "product": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "product": { "name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "product_id": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "product": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "product": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "product": { "name": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "product_id": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "product": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "product": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "product": { "name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "product_id": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-docs@1.13.15-3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch" }, "product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch" }, "product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4214" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4214" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4214" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_3780
Vulnerability from csaf_redhat
Published
2020-09-21 19:50
Modified
2024-09-18 04:26
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.5.11 ose-cluster-svcat-apiserver-operator-container security update
Notes
Topic
An update for ose-cluster-svcat-apiserver-operator-container is now available for Red Hat OpenShift Container Platform 4.5.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ose-cluster-svcat-apiserver-operator-container is now available for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3780", "url": "https://access.redhat.com/errata/RHSA-2020:3780" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_3780.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.11 ose-cluster-svcat-apiserver-operator-container security update", "tracking": { "current_release_date": "2024-09-18T04:26:52+00:00", "generator": { "date": "2024-09-18T04:26:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:3780", "initial_release_date": "2020-09-21T19:50:11+00:00", "revision_history": [ { "date": "2020-09-21T19:50:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-09-21T19:50:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:26:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455_ppc64le", "product": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455_ppc64le", "product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202009112201.p0" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf_s390x", "product": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf_s390x", "product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202009112201.p0" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052_amd64", "product": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052_amd64", "product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202009112201.p0" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052_amd64" }, "product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf_s390x" }, "product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455_ppc64le" }, "product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3780" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:032aba06e045c1514580674e41047f82af8db63c1be171aed886c137c582d052_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:16689dfc4918f8fcf5a73a7bbd7c3888f836fbecc820eb3575d474a59d4e18bf_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:62cbc44bdcde5a17f8f0ac60821d2eedd002fb6479e21443d5ce0adb972b9455_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2021_1129
Vulnerability from csaf_redhat
Published
2021-04-08 10:18
Modified
2024-09-18 04:28
Summary
Red Hat Security Advisory: Red Hat 3scale API Management 2.10.0 security update and release
Notes
Topic
A security update for Red Hat 3scale API Management Platform is now available from the Red Hat Container Catalog.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat 3scale API Management delivers centralized API management features through a distributed, cloud-hosted layer. It includes built-in features to help in building a more successful API program, including access control, rate limits, payment gateway integration, and developer experience tools.
This advisory is intended to use with container images for Red Hat 3scale API Management 2.10.0.
Security Fix(es):
* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update for Red Hat 3scale API Management Platform is now available from the Red Hat Container Catalog.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat 3scale API Management delivers centralized API management features through a distributed, cloud-hosted layer. It includes built-in features to help in building a more successful API program, including access control, rate limits, payment gateway integration, and developer experience tools.\n\nThis advisory is intended to use with container images for Red Hat 3scale API Management 2.10.0.\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1129", "url": "https://access.redhat.com/errata/RHSA-2021:1129" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management/2.10/html-single/installing_3scale/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management/2.10/html-single/installing_3scale/index" }, { "category": "external", "summary": "1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_1129.json" } ], "title": "Red Hat Security Advisory: Red Hat 3scale API Management 2.10.0 security update and release", "tracking": { "current_release_date": "2024-09-18T04:28:08+00:00", "generator": { "date": "2024-09-18T04:28:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:1129", "initial_release_date": "2021-04-08T10:18:08+00:00", "revision_history": [ { "date": "2021-04-08T10:18:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-08T10:18:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:28:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat 3Scale AMP 2.10", "product": { "name": "Red Hat 3Scale AMP 2.10", "product_id": "7Server-RH7-3scale-AMP-2.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:3scale_amp:2.10::el7" } } } ], "category": "product_family", "name": "3scale API Management" }, { "branches": [ { "category": "product_version", "name": "3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "product": { "name": "3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "product_id": "3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "product_identification_helper": { "purl": "pkg:oci/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84?arch=amd64\u0026repository_url=registry.redhat.io/3scale-amp2/apicast-rhel7-operator-metadata\u0026tag=3scale2.10.0" } } }, { "category": "product_version", "name": "3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64", "product": { "name": "3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64", "product_id": "3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64", "product_identification_helper": { "purl": "pkg:oci/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0?arch=amd64\u0026repository_url=registry.redhat.io/3scale-amp2/apicast-rhel7-operator\u0026tag=1.13.0-4" } } }, { "category": "product_version", "name": "3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "product": { "name": "3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "product_id": "3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "product_identification_helper": { "purl": "pkg:oci/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496?arch=amd64\u0026repository_url=registry.redhat.io/3scale-amp2/3scale-rhel7-operator-metadata\u0026tag=3scale2.10.0" } } }, { "category": "product_version", "name": "3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "product": { "name": "3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "product_id": "3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "product_identification_helper": { "purl": "pkg:oci/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a?arch=amd64\u0026repository_url=registry.redhat.io/3scale-amp2/3scale-rhel7-operator\u0026tag=1.13.0-17" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64 as a component of Red Hat 3Scale AMP 2.10", "product_id": "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64" }, "product_reference": "3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "relates_to_product_reference": "7Server-RH7-3scale-AMP-2.10" }, { "category": "default_component_of", "full_product_name": { "name": "3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64 as a component of Red Hat 3Scale AMP 2.10", "product_id": "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64" }, "product_reference": "3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "relates_to_product_reference": "7Server-RH7-3scale-AMP-2.10" }, { "category": "default_component_of", "full_product_name": { "name": "3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64 as a component of Red Hat 3Scale AMP 2.10", "product_id": "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64" }, "product_reference": "3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "relates_to_product_reference": "7Server-RH7-3scale-AMP-2.10" }, { "category": "default_component_of", "full_product_name": { "name": "3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64 as a component of Red Hat 3Scale AMP 2.10", "product_id": "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" }, "product_reference": "3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64", "relates_to_product_reference": "7Server-RH7-3scale-AMP-2.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14836", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1750928" } ], "notes": [ { "category": "description", "text": "It was found that the 3scale dev portal does not employ mechanisms for protection against login CSRF. An attacker could use this flaw to access unauthorized information or conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "3scale: dev portal missing protection against login CSRF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14836" }, { "category": "external", "summary": "RHBZ#1750928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750928" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14836", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14836" } ], "release_date": "2020-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_3scale_api_management/2.10/html-single/installing_3scale/index", "product_ids": [ "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1129" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "3scale: dev portal missing protection against login CSRF" }, { "cve": "CVE-2020-9283", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2020-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1804533" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform uses the vulnerable library in a number of components but strictly as an SSH client. The severity of this vulnerability is reduced for clients as it requires connections to malicious SSH servers, with the maximum impact only a client crash. This vulnerability is rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9283" }, { "category": "external", "summary": "RHBZ#1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY", "url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY" } ], "release_date": "2020-02-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_3scale_api_management/2.10/html-single/installing_3scale/index", "product_ids": [ "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1129" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_3scale_api_management/2.10/html-single/installing_3scale/index", "product_ids": [ "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1129" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator-metadata@sha256:f698cf1102a1847cba810f5be68c264223a37f6424c3e4902465111b5b74d496_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/3scale-rhel7-operator@sha256:655062177bc53b155b87876dc1096530c365f18f9be3ceb0d32aa2d343968f9a_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator-metadata@sha256:65447df0f16603ea021eaae880865ccfcb4449aab6fc2fd519da554c46987e84_amd64", "7Server-RH7-3scale-AMP-2.10:3scale-amp2/apicast-rhel7-operator@sha256:ef5c4e42d2ce962a21ff0c61f500c6dd672d07ff7f4bfce039ca6851a0fcbef0_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2020_5633
Vulnerability from csaf_redhat
Published
2021-02-24 15:09
Modified
2021-03-02 01:59
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update
Notes
Topic
Red Hat OpenShift Container Platform release 4.7.0 is now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container
Platform 4.7.0. See the following advisory for the RPM packages for this
release:
https://access.redhat.com/errata/RHSA-2020:5634
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-x86_64
The image digest is sha256:d74b1cfa81f8c9cc23336aee72d8ae9c9905e62c4874b071317a078c316f8a70
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-s390x
The image digest is sha256:a68ca03d87496ddfea0ac26b82af77231583a58a7836b95de85efe5e390ad45d
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-ppc64le
The image digest is sha256:bc7b04e038c8ff3a33b827f4ee19aa79b26e14c359a7dcc1ced9f3b58e5f1ac6
All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Security Fix(es):
* crewjam/saml: authentication bypass in saml authentication (CVE-2020-27846)
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider (CVE-2020-8563)
* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)
* heketi: gluster-block volume password details available in logs (CVE-2020-10763)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)
* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)
* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.7.0 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.7.0. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2020:5634\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata as follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-x86_64\n\nThe image digest is sha256:d74b1cfa81f8c9cc23336aee72d8ae9c9905e62c4874b071317a078c316f8a70\n\n(For s390x architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-s390x\n\nThe image digest is sha256:a68ca03d87496ddfea0ac26b82af77231583a58a7836b95de85efe5e390ad45d\n\n(For ppc64le architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-ppc64le\n\nThe image digest is sha256:bc7b04e038c8ff3a33b827f4ee19aa79b26e14c359a7dcc1ced9f3b58e5f1ac6\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.\n\nSecurity Fix(es):\n\n* crewjam/saml: authentication bypass in saml authentication (CVE-2020-27846)\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider (CVE-2020-8563)\n\n* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)\n\n* heketi: gluster-block volume password details available in logs (CVE-2020-10763)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5633", "url": "https://access.redhat.com/errata/RHSA-2020:5633" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2020_5633.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2021-03-02T01:59:00Z", "generator": { "date": "2023-07-01T04:39:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2020:5633", "initial_release_date": "2021-02-24T15:09:00Z", "revision_history": [ { "date": "2021-03-02T01:59:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cli:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cli:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cli:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "product": { "name": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "product_id": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-console-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-console-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-console-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-console:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-console:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-console:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-coredns:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-coredns:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-coredns:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-deployer:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-deployer:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-deployer:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-etcd:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-etcd:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-etcd:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-grafana:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-grafana:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-grafana:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-installer:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-installer:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-installer:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-jenkins:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-jenkins:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-jenkins:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "product": { "name": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "product_id": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0" } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-must-gather:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-must-gather:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-must-gather:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-pod:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-pod:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-pod:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-telemeter:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-telemeter:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-telemeter:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-tests:v4.7.0-202102181036.p0", "product": { "name": "openshift4/ose-tests:v4.7.0-202102181036.p0", "product_id": "openshift4/ose-tests:v4.7.0-202102181036.p0" } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "product_id": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" } } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cli:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0" }, "product_reference": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-console-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-console:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-coredns:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-deployer:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-etcd:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-grafana:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-installer:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-jenkins:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0" }, "product_reference": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-must-gather:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-pod:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-telemeter:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests:v4.7.0-202102181036.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0" }, "product_reference": "openshift4/ose-tests:v4.7.0-202102181036.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2020-11-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in nodejs-y18n. There is a prototype pollution vulnerability in y18n\u0027s locale functionality. If an attacker is able to provide untrusted input via locale, they may be able to cause denial of service or in rare circumstances, impact to data integrity or confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-y18n: prototype pollution vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" }, { "category": "external", "summary": "CVE-2020-7774", "url": "https://access.redhat.com/security/cve/CVE-2020-7774" }, { "category": "external", "summary": "bz#1898680: CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" } ], "release_date": "2020-10-25T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Kaizhe Huang" ], "organization": "derek0405", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8563", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1886635" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in kubernetes. Clusters running on VSphere, using VSphere as a cloud provider a with logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager\u0027s log.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8563", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8563" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95621", "url": "https://github.com/kubernetes/kubernetes/issues/95621" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" }, { "category": "external", "summary": "CVE-2020-8563", "url": "https://access.redhat.com/security/cve/CVE-2020-8563" }, { "category": "external", "summary": "bz#1886635: CVE-2020-8563 kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886635" } ], "release_date": "2020-10-14T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-10-09T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-8563 kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Etienne Champetier" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-10749", "cwe": { "id": "CWE-300", "name": "Channel Accessible by Non-Endpoint" }, "discovery_date": "2020-05-08T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1833220" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A vulnerability was found in affected container networking implementations that allow malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending \u201crogue\u201d IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.", "title": "Vulnerability description" }, { "category": "summary", "text": "containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10749", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10749" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8" }, { "category": "external", "summary": "CVE-2020-10749", "url": "https://access.redhat.com/security/cve/CVE-2020-10749" }, { "category": "external", "summary": "bz#1833220: CVE-2020-10749 containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833220" } ], "release_date": "2020-06-01T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-05-08T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-10749 containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters" }, { "acknowledgments": [ { "names": [ "Prasanna Kumar Kalever" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-10763", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2020-06-05T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1845387" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "An information-disclosure flaw was found in the way Heketi logs sensitive information. This flaw allows an attacker with local access to the Heketi server, to read potentially sensitive information, such as gluster-block passwords.", "title": "Vulnerability description" }, { "category": "summary", "text": "heketi: gluster-block volume password details available in logs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10763", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10763" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10763", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10763" }, { "category": "external", "summary": "https://github.com/heketi/heketi/releases/tag/v10.1.0", "url": "https://github.com/heketi/heketi/releases/tag/v10.1.0" }, { "category": "external", "summary": "CVE-2020-10763", "url": "https://access.redhat.com/security/cve/CVE-2020-10763" }, { "category": "external", "summary": "bz#1845387: CVE-2020-10763 heketi: gluster-block volume password details available in logs", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845387" } ], "release_date": "2020-09-30T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-05T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-10763 heketi: gluster-block volume password details available in logs" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" }, { "category": "external", "summary": "CVE-2020-14040", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "bz#1853652: CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "release_date": "2020-06-17T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-26160", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-23T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A vulnerability was found in jwt-go where it is vulnerable to Access Restriction Bypass if m[\"aud\"] happens to be []string{}, as allowed by the spec, the type assertion fails and the value of aud is \"\". This can cause audience verification to succeed even if the audiences being passed are incorrect if required is set to false.", "title": "Vulnerability description" }, { "category": "summary", "text": "jwt-go: access restriction bypass vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26160", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515" }, { "category": "external", "summary": "CVE-2020-26160", "url": "https://access.redhat.com/security/cve/CVE-2020-26160" }, { "category": "external", "summary": "bz#1883371: CVE-2020-26160 jwt-go: access restriction bypass vulnerability", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" } ], "release_date": "2020-09-15T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-09-23T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-26160 jwt-go: access restriction bypass vulnerability" }, { "cve": "CVE-2020-27813", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-11-27T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gorilla-websocket: integer overflow leads to denial of service", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27813", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813" }, { "category": "external", "summary": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh", "url": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh" }, { "category": "external", "summary": "CVE-2020-27813", "url": "https://access.redhat.com/security/cve/CVE-2020-27813" }, { "category": "external", "summary": "bz#1902111: CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" } ], "release_date": "2019-08-25T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service" }, { "cve": "CVE-2020-27846", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2020-12-15T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1907670" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "crewjam/saml: authentication bypass in saml authentication", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27846", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27846" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27846", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27846" }, { "category": "external", "summary": "https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9", "url": "https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9" }, { "category": "external", "summary": "https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/", "url": "https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/" }, { "category": "external", "summary": "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/", "url": "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/" }, { "category": "external", "summary": "CVE-2020-27846", "url": "https://access.redhat.com/security/cve/CVE-2020-27846" }, { "category": "external", "summary": "bz#1907670: CVE-2020-27846 crewjam/saml: authentication bypass in saml authentication", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907670" } ], "release_date": "2020-12-17T13:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-12-15T00:00:00Z", "details": "Critical" } ], "title": "CVE-2020-27846 crewjam/saml: authentication bypass in saml authentication" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" }, { "category": "external", "summary": "CVE-2020-28362", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "bz#1897635: CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" } ], "release_date": "2020-11-12T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers" }, { "cve": "CVE-2020-29652", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-12-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" }, { "category": "external", "summary": "CVE-2020-29652", "url": "https://access.redhat.com/security/cve/CVE-2020-29652" }, { "category": "external", "summary": "bz#1908883: CVE-2020-29652 golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" } ], "release_date": "2020-12-16T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-12-17T00:00:00Z", "details": "Important" } ], "title": "CVE-2020-29652 golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" }, { "category": "external", "summary": "CVE-2021-3121", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "bz#1921650: CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" } ], "release_date": "2021-01-11T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2021-01-28T00:00:00Z", "details": "Important" } ], "title": "CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-26539", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-08T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1932362" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the \"allowedIframeHostnames\" option.", "title": "Vulnerability description" }, { "category": "summary", "text": "sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26539", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26539" }, { "category": "external", "summary": "CVE-2021-26539", "url": "https://access.redhat.com/security/cve/CVE-2021-26539" }, { "category": "external", "summary": "bz#1932362: CVE-2021-26539 sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932362" } ], "release_date": "2021-01-22T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2021-02-08T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-26539 sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation" } ] }
rhsa-2020_5054
Vulnerability from csaf_redhat
Published
2020-11-10 13:54
Modified
2024-09-18 04:27
Summary
Red Hat Security Advisory: skopeo security update
Notes
Topic
An update for skopeo is now available for Red Hat Enterprise Linux 7 Extras.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for skopeo is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5054", "url": "https://access.redhat.com/errata/RHSA-2020:5054" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_5054.json" } ], "title": "Red Hat Security Advisory: skopeo security update", "tracking": { "current_release_date": "2024-09-18T04:27:59+00:00", "generator": { "date": "2024-09-18T04:27:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:5054", "initial_release_date": "2020-11-10T13:54:32+00:00", "revision_history": [ { "date": "2020-11-10T13:54:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-10T13:54:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:27:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "containers-common-1:0.1.40-12.el7_9.x86_64", "product": { "name": "containers-common-1:0.1.40-12.el7_9.x86_64", "product_id": "containers-common-1:0.1.40-12.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.40-12.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:0.1.40-12.el7_9.x86_64", "product": { "name": "skopeo-1:0.1.40-12.el7_9.x86_64", "product_id": "skopeo-1:0.1.40-12.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.40-12.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64", "product_id": "skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.40-12.el7_9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "skopeo-1:0.1.40-12.el7_9.src", "product": { "name": "skopeo-1:0.1.40-12.el7_9.src", "product_id": "skopeo-1:0.1.40-12.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.40-12.el7_9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "containers-common-1:0.1.40-12.el7_9.ppc64le", "product": { "name": "containers-common-1:0.1.40-12.el7_9.ppc64le", "product_id": "containers-common-1:0.1.40-12.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.40-12.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:0.1.40-12.el7_9.ppc64le", "product": { "name": "skopeo-1:0.1.40-12.el7_9.ppc64le", "product_id": "skopeo-1:0.1.40-12.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.40-12.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.40-12.el7_9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "containers-common-1:0.1.40-12.el7_9.s390x", "product": { "name": "containers-common-1:0.1.40-12.el7_9.s390x", "product_id": "containers-common-1:0.1.40-12.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.40-12.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:0.1.40-12.el7_9.s390x", "product": { "name": "skopeo-1:0.1.40-12.el7_9.s390x", "product_id": "skopeo-1:0.1.40-12.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.40-12.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "product_id": "skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.40-12.el7_9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.ppc64le" }, "product_reference": "containers-common-1:0.1.40-12.el7_9.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.s390x" }, "product_reference": "containers-common-1:0.1.40-12.el7_9.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.x86_64" }, "product_reference": "containers-common-1:0.1.40-12.el7_9.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.ppc64le" }, "product_reference": "skopeo-1:0.1.40-12.el7_9.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.s390x" }, "product_reference": "skopeo-1:0.1.40-12.el7_9.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-12.el7_9.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.src" }, "product_reference": "skopeo-1:0.1.40-12.el7_9.src", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.x86_64" }, "product_reference": "skopeo-1:0.1.40-12.el7_9.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.ppc64le" }, "product_reference": "containers-common-1:0.1.40-12.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.s390x" }, "product_reference": "containers-common-1:0.1.40-12.el7_9.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.40-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.x86_64" }, "product_reference": "containers-common-1:0.1.40-12.el7_9.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.ppc64le" }, "product_reference": "skopeo-1:0.1.40-12.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.s390x" }, "product_reference": "skopeo-1:0.1.40-12.el7_9.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-12.el7_9.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.src" }, "product_reference": "skopeo-1:0.1.40-12.el7_9.src", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.40-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.x86_64" }, "product_reference": "skopeo-1:0.1.40-12.el7_9.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.s390x", "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.x86_64", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.s390x", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.src", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.x86_64", "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.src", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.s390x", "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.x86_64", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.s390x", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.src", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.x86_64", "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.src", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.s390x", "7Server-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.x86_64", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.s390x", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.src", "7Server-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.x86_64", "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "7Server-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:containers-common-1:0.1.40-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.src", "7Workstation-EXTRAS-7.9:skopeo-1:0.1.40-12.el7_9.x86_64", "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.ppc64le", "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.s390x", "7Workstation-EXTRAS-7.9:skopeo-debuginfo-1:0.1.40-12.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2021_3140
Vulnerability from csaf_redhat
Published
2021-08-11 18:21
Modified
2024-09-18 04:29
Summary
Red Hat Security Advisory: Red Hat Fuse 7.9.0 release and security update
Notes
Topic
A minor version update (from 7.8 to 7.9) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Red Hat Fuse 7.9.0 serves as a replacement for Red Hat Fuse 7.8, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* hawtio-osgi (CVE-2017-5645)
* prometheus-jmx-exporter: snakeyaml (CVE-2017-18640)
* apache-commons-compress (CVE-2019-12402)
* karaf-transaction-manager-narayana: netty (CVE-2019-16869, CVE-2019-20445)
* tomcat (CVE-2020-1935, CVE-2020-1938, CVE-2020-9484, CVE-2020-13934, CVE-2020-13935, CVE-2020-11996)
* spring-cloud-config-server (CVE-2020-5410)
* velocity (CVE-2020-13936)
* httpclient: apache-httpclient (CVE-2020-13956)
* shiro-core: shiro (CVE-2020-17510)
* hibernate-core (CVE-2020-25638)
* wildfly-openssl (CVE-2020-25644)
* jetty (CVE-2020-27216, CVE-2021-28165)
* bouncycastle (CVE-2020-28052)
* wildfly (CVE-2019-14887, CVE-2020-25640)
* resteasy-jaxrs: resteasy (CVE-2020-1695)
* camel-olingo4 (CVE-2020-1925)
* springframework (CVE-2020-5421)
* jsf-impl: Mojarra (CVE-2020-6950)
* resteasy (CVE-2020-10688)
* hibernate-validator (CVE-2020-10693)
* wildfly-elytron (CVE-2020-10714)
* undertow (CVE-2020-10719)
* activemq (CVE-2020-13920)
* cxf-core: cxf (CVE-2020-13954)
* fuse-apicurito-operator-container: golang.org/x/text (CVE-2020-14040)
* jboss-ejb-client: wildfly (CVE-2020-14297)
* xercesimpl: wildfly (CVE-2020-14338)
* xnio (CVE-2020-14340)
* flink: apache-flink (CVE-2020-17518)
* resteasy-client (CVE-2020-25633)
* xstream (CVE-2020-26258)
* mybatis (CVE-2020-26945)
* pdfbox (CVE-2021-27807, CVE-2021-27906)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.8 to 7.9) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.9.0 serves as a replacement for Red Hat Fuse 7.8, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* hawtio-osgi (CVE-2017-5645)\n\n* prometheus-jmx-exporter: snakeyaml (CVE-2017-18640)\n\n* apache-commons-compress (CVE-2019-12402)\n\n* karaf-transaction-manager-narayana: netty (CVE-2019-16869, CVE-2019-20445)\n\n* tomcat (CVE-2020-1935, CVE-2020-1938, CVE-2020-9484, CVE-2020-13934, CVE-2020-13935, CVE-2020-11996)\n\n* spring-cloud-config-server (CVE-2020-5410)\n\n* velocity (CVE-2020-13936)\n\n* httpclient: apache-httpclient (CVE-2020-13956)\n\n* shiro-core: shiro (CVE-2020-17510)\n\n* hibernate-core (CVE-2020-25638)\n\n* wildfly-openssl (CVE-2020-25644)\n\n* jetty (CVE-2020-27216, CVE-2021-28165)\n\n* bouncycastle (CVE-2020-28052)\n\n* wildfly (CVE-2019-14887, CVE-2020-25640)\n\n* resteasy-jaxrs: resteasy (CVE-2020-1695)\n\n* camel-olingo4 (CVE-2020-1925)\n\n* springframework (CVE-2020-5421)\n\n* jsf-impl: Mojarra (CVE-2020-6950)\n\n* resteasy (CVE-2020-10688)\n\n* hibernate-validator (CVE-2020-10693)\n\n* wildfly-elytron (CVE-2020-10714)\n\n* undertow (CVE-2020-10719)\n\n* activemq (CVE-2020-13920)\n\n* cxf-core: cxf (CVE-2020-13954)\n\n* fuse-apicurito-operator-container: golang.org/x/text (CVE-2020-14040)\n\n* jboss-ejb-client: wildfly (CVE-2020-14297)\n\n* xercesimpl: wildfly (CVE-2020-14338)\n\n* xnio (CVE-2020-14340)\n\n* flink: apache-flink (CVE-2020-17518)\n\n* resteasy-client (CVE-2020-25633)\n\n* xstream (CVE-2020-26258)\n\n* mybatis (CVE-2020-26945)\n\n* pdfbox (CVE-2021-27807, CVE-2021-27906)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3140", "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.9.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.9.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/" }, { "category": "external", "summary": "1443635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443635" }, { "category": "external", "summary": "1730462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730462" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1764640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764640" }, { "category": "external", "summary": "1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "1785376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785376" }, { "category": "external", "summary": "1790309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790309" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1805006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1805006" }, { "category": "external", "summary": "1805501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1805501" }, { "category": "external", "summary": "1806398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806398" }, { "category": "external", "summary": "1806835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806835" }, { "category": "external", "summary": "1814974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974" }, { "category": "external", "summary": "1825714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825714" }, { "category": "external", "summary": "1828459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828459" }, { "category": "external", "summary": "1838332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1838332" }, { "category": "external", "summary": "1845626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845626" }, { "category": "external", "summary": "1851420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851420" }, { "category": "external", "summary": "1853595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853595" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1857024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857024" }, { "category": "external", "summary": "1857040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857040" }, { "category": "external", "summary": "1860054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860054" }, { "category": "external", "summary": "1860218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860218" }, { "category": "external", "summary": "1879042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879042" }, { "category": "external", "summary": "1880101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880101" }, { "category": "external", "summary": "1881158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881158" }, { "category": "external", "summary": "1881353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881353" }, { "category": "external", "summary": "1881637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881637" }, { "category": "external", "summary": "1885485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885485" }, { "category": "external", "summary": "1886587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886587" }, { "category": "external", "summary": "1887257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887257" }, { "category": "external", "summary": "1891132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891132" }, { "category": "external", "summary": "1898235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898235" }, { "category": "external", "summary": "1903727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903727" }, { "category": "external", "summary": "1908832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908832" }, { "category": "external", "summary": "1912881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912881" }, { "category": "external", "summary": "1913312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913312" }, { "category": "external", "summary": "1937440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937440" }, { "category": "external", "summary": "1941050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941050" }, { "category": "external", "summary": "1941055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941055" }, { "category": "external", "summary": "1945714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945714" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3140.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.9.0 release and security update", "tracking": { "current_release_date": "2024-09-18T04:29:13+00:00", "generator": { "date": "2024-09-18T04:29:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3140", "initial_release_date": "2021-08-11T18:21:58+00:00", "revision_history": [ { "date": "2021-08-11T18:21:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-11T18:21:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:29:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.9", "product": { "name": "Red Hat Fuse 7.9", "product_id": "Red Hat Fuse 7.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5645", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443635" } ], "notes": [ { "category": "description", "text": "It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Socket receiver deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The flaw in Log4j-1.x is now identified by CVE-2019-17571. CVE-2017-5645 has been assigned by MITRE to a similar flaw identified in Log4j-2.x", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5645" }, { "category": "external", "summary": "RHBZ#1443635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5645" } ], "release_date": "2017-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "log4j: Socket receiver deserialization vulnerability" }, { "cve": "CVE-2017-18640", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2019-12-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1785376" } ], "notes": [ { "category": "description", "text": "The Alias feature in SnakeYAML before 1.26 allows entity expansion during a load operation, a related issue to CVE-2003-1564.", "title": "Vulnerability description" }, { "category": "summary", "text": "snakeyaml: Billion laughs attack via alias feature", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18640" }, { "category": "external", "summary": "RHBZ#1785376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18640", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18640" } ], "release_date": "2019-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "snakeyaml: Billion laughs attack via alias feature" }, { "cve": "CVE-2019-12402", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2019-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764640" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was discovered in apache-commons-compress in the way NioZipEncoding encodes filenames. Applications that use Compress to create archives, with one of the filenames within the archive being controlled by the user, may be vulnerable to this flaw. A remote attacker could exploit this flaw to cause an infinite loop during the archive creation, thus leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: Infinite loop in name encoding algorithm", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of apache-commons-compress as shipped with Red Hat Enterprise Linux 7, and the versions of rh-java-common-apache-commons-compress and rh-maven35-apache-commons-compress as shipped with Red Hat Software Collections 3, as they used a fallback zip encoding implementation (leveraging java.io) to encode filenames.\nThis issue does not affect the versions of rh-maven36-apache-commons-compress as shipped with Red Hat Software Collection 3 as they already include the patch.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12402" }, { "category": "external", "summary": "RHBZ#1764640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12402", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12402" } ], "release_date": "2019-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: Infinite loop in name encoding algorithm" }, { "cve": "CVE-2019-14887", "cwe": { "id": "CWE-757", "name": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)" }, "discovery_date": "2019-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772008" } ], "notes": [ { "category": "description", "text": "A flaw was found when an OpenSSL security provider is used with Wildfly, the \u0027enabled-protocols\u0027 value in the Wildfly configuration isn\u0027t honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14887" }, { "category": "external", "summary": "RHBZ#1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14887", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Avoid using an OpenSSL security provider and instead use the default configuration or regular JSSE provider with \u0027TLS\u0027.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "acknowledgments": [ { "names": [ "Mirko Selber" ], "organization": "Compass Security" } ], "cve": "CVE-2020-1695", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730462" } ], "notes": [ { "category": "description", "text": "A flaw was found in Resteasy, where an improper input validation results in returning an illegal header that integrates into the server\u0027s response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1695" }, { "category": "external", "summary": "RHBZ#1730462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1695" } ], "release_date": "2020-04-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class" }, { "cve": "CVE-2020-1925", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1790309" } ], "notes": [ { "category": "description", "text": "Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "olingo-odata: Server side request forgery in AsyncResponseWrapperImpl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1925" }, { "category": "external", "summary": "RHBZ#1790309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790309" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1925", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1925" } ], "release_date": "2020-01-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "olingo-odata: Server side request forgery in AsyncResponseWrapperImpl" }, { "acknowledgments": [ { "names": [ "@ZeddYu" ], "organization": "Apache Tomcat Security Team" } ], "cve": "CVE-2020-1935", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1806835" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. The HTTP header parsing code used an approach to end-of-line (EOL) parsing that allowed some invalid HTTP headers to be parsed as valid. This led to the possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. The highest threat with this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenDaylight in Red Hat OpenStack 10 \u0026 13 was in technical preview status, because of this no fixes will be released for it.\n\nIn Red Hat Satellite 6, Candlepin is using Tomcat to provide a REST API, and has been found to be vulnerable to the flaw. However, it is currently believed that no useful attacks can be carried over.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1935" }, { "category": "external", "summary": "RHBZ#1806835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806835" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1935", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1935" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1935", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1935" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51" }, { "category": "external", "summary": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31" } ], "release_date": "2020-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Workaround for Red Hat Satellite 6 is to add iptables rule to deny TCP requests of Tomcat that are not originating from the Satellite.\n\nFor other Red Hat products, either mitigation isn\u0027t available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling" }, { "cve": "CVE-2020-1938", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1806398" } ], "notes": [ { "category": "description", "text": "CVE-2020-1938 is a file read/inclusion vulnerability in the AJP connector in Apache Tomcat. This is enabled by default with a default configuration port of 8009. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution (RCE).", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251 and CVE page https://access.redhat.com/security/cve/cve-2020-1745", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1938" }, { "category": "external", "summary": "RHBZ#1806398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806398" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1938", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1938" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1938", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1938" }, { "category": "external", "summary": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/", "url": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51" }, { "category": "external", "summary": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31" }, { "category": "external", "summary": "https://www.cnvd.org.cn/webinfo/show/5415", "url": "https://www.cnvd.org.cn/webinfo/show/5415" }, { "category": "external", "summary": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487", "url": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2020-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Low" } ], "title": "tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability" }, { "cve": "CVE-2020-5410", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2020-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845626" } ], "notes": [ { "category": "description", "text": "A flaw was found in spring-cloud-config in versions prior to 2.1.9 and 2.2.3. Applications are allowed to serve arbitrary configuration files through the spring-cloud-config-server module allowing an attacker to send a request using a specially crafted URL to create a directory traversal attack. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-cloud-config-server: sending a request using a specially crafted URL can lead to a directory traversal attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-5410" }, { "category": "external", "summary": "RHBZ#1845626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845626" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-5410", "url": "https://www.cve.org/CVERecord?id=CVE-2020-5410" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-5410", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5410" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2020-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Users of vulnerable versions or older, unsupported versions of spring-cloud-config-server should upgrade to a patched version. Spring-cloud-config-server should only be accessible on internal networks.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Low" } ], "title": "spring-cloud-config-server: sending a request using a specially crafted URL can lead to a directory traversal attack" }, { "cve": "CVE-2020-5421", "discovery_date": "2020-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881158" } ], "notes": [ { "category": "description", "text": "In Spring Framework, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: RFD protection bypass via jsessionid", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of SpringFramework (embedded in rhvm-dependencies) shipped with Red Hat Virtualization, as it does not provide support for spring-web.\n\nIn Red Hat Gluster Storage 3, SpringFramework (embedded in rhvm-dependencies) was shipped as a part of Red Hat Gluster Storage Console that is no longer supported for use with Red Hat Gluster Storage 3.5. However, spring-web is not included in the shipped version of SpringFramework.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-5421" }, { "category": "external", "summary": "RHBZ#1881158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-5421", "url": "https://www.cve.org/CVERecord?id=CVE-2020-5421" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-5421", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5421" } ], "release_date": "2020-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "springframework: RFD protection bypass via jsessionid" }, { "acknowledgments": [ { "names": [ "An Trinh" ] } ], "cve": "CVE-2020-6950", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2019-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1805006" } ], "notes": [ { "category": "description", "text": "A flaw was found in Eclipse Mojarra before version 2.3.14, where it is vulnerable to a path traversal flaw via the loc parameter or the con parameter. An attacker could exploit this flaw to read arbitrary files.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-6950" }, { "category": "external", "summary": "RHBZ#1805006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1805006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-6950", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6950" }, { "category": "external", "summary": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943" }, { "category": "external", "summary": "https://github.com/eclipse-ee4j/mojarra/commit/1b434748d9239f42eae8aa7d37d7a0930c061e24", "url": "https://github.com/eclipse-ee4j/mojarra/commit/1b434748d9239f42eae8aa7d37d7a0930c061e24" }, { "category": "external", "summary": "https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741", "url": "https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741" }, { "category": "external", "summary": "https://github.com/eclipse-ee4j/mojarra/issues/4571", "url": "https://github.com/eclipse-ee4j/mojarra/issues/4571" }, { "category": "external", "summary": "https://github.com/javaserverfaces/mojarra/issues/4364", "url": "https://github.com/javaserverfaces/mojarra/issues/4364" } ], "release_date": "2020-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371" }, { "cve": "CVE-2020-9484", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1838332" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in Apache Tomcat\u0027s use of a FileStore. Under specific circumstances, an attacker can use a specially crafted request to trigger Remote Code Execution through deserialization of the file under their control. The highest threat from the vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: deserialization flaw in session persistence storage leading to RCE", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8, Red Hat Certificate System 10 and Identity Management are using the pki-servlet-engine component, which embeds a vulnerable version of Tomcat. However, in these specific contexts, the prerequisites to the vulnerability are not met. The PersistentManager is not set, and a SecurityManager is used. The use of pki-servlet-engine outside of these contexts is not supported. As a result, the vulnerability can not be triggered in supported configurations of these products. A future update may update Tomcat in pki-servlet-engine.\n\nRed Hat Satellite do not ship Tomcat and rather use its configuration. The product is not affected because configuration does not make use of PersistanceManager or FileStore. Tomcat updates can be obtain from Red Hat Enterprise Linux (RHEL) RHSA.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9484" }, { "category": "external", "summary": "RHBZ#1838332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1838332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9484", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9484" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9484", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9484" }, { "category": "external", "summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E", "url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5" }, { "category": "external", "summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104", "url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55" }, { "category": "external", "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35" } ], "release_date": "2020-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Users may configure the PersistenceManager with an appropriate value for sessionAttributeValueClassNameFilter to ensure that only application provided attributes are serialized and deserialized. For more details about the configuration, refer to the Apache Tomcat 9 Configuration Reference https://tomcat.apache.org/tomcat-9.0-doc/config/manager.html.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: deserialization flaw in session persistence storage leading to RCE" }, { "cve": "CVE-2020-10688", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1814974" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in RESTEasy, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10688" }, { "category": "external", "summary": "RHBZ#1814974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10688", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10688" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10688", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10688" }, { "category": "external", "summary": "https://github.com/quarkusio/quarkus/issues/7248", "url": "https://github.com/quarkusio/quarkus/issues/7248" }, { "category": "external", "summary": "https://issues.redhat.com/browse/RESTEASY-2519", "url": "https://issues.redhat.com/browse/RESTEASY-2519" } ], "release_date": "2020-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack" }, { "acknowledgments": [ { "names": [ "Alvaro Mu\u00f1oz" ], "organization": "GitHub Security Labs" } ], "cve": "CVE-2020-10693", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1805501" } ], "notes": [ { "category": "description", "text": "A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages.", "title": "Vulnerability description" }, { "category": "summary", "text": "hibernate-validator: Improper input validation in the interpolation of constraint error messages", "title": "Vulnerability summary" }, { "category": "other", "text": "hibernate-validator is packaged with Red Hat OpenStack Platform 13.0\u0027s OpenDaylight (ODL). However, because ODL is technical preview in this version and the flaw is moderate, Red Hat will not be releasing a fix for the OpenStack package at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10693" }, { "category": "external", "summary": "RHBZ#1805501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1805501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10693", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10693" } ], "release_date": "2020-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "You can pass user input as an expression variable by unwrapping the context to HibernateConstraintValidatorContext. Please refer to the https://in.relation.to/2020/05/07/hibernate-validator-615-6020-released/ and https://docs.jboss.org/hibernate/stable/validator/reference/en-US/html_single/#_the_code_constraintvalidatorcontext_code.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hibernate-validator: Improper input validation in the interpolation of constraint error messages" }, { "acknowledgments": [ { "names": [ "Mark Banierink" ], "organization": "Nedap" } ], "cve": "CVE-2020-10714", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2020-03-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1825714" } ], "notes": [ { "category": "description", "text": "A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-elytron: session fixation when using FORM authentication", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10714" }, { "category": "external", "summary": "RHBZ#1825714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825714" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10714", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10714" } ], "release_date": "2020-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "This attack is dependent on the attacker being able to create a session and the victim accessing the session before the session expires, we do have a 15 minute session timeout by default but the attacker could also keep this alive by say sending in a request every five minutes.\n\nThe server by default supports session tracking by URL and Cookie, if the web.xml is updated to support COOKIE only the exploit is not possible by sharing the link.\n~~~\n \u003csession-config\u003e\n \u003ctracking-mode\u003eURL\u003c/tracking-mode\u003e\n \u003c/session-config\u003e\n~~~\nTO\n~~~\n \u003csession-config\u003e\n \u003ctracking-mode\u003eCOOKIE\u003c/tracking-mode\u003e\n \u003c/session-config\u003e\n~~~", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-elytron: session fixation when using FORM authentication" }, { "acknowledgments": [ { "names": [ "ZeddYu" ] } ], "cve": "CVE-2020-10719", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828459" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: invalid HTTP request with large chunk size", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10719" }, { "category": "external", "summary": "RHBZ#1828459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10719", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10719" } ], "release_date": "2020-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: invalid HTTP request with large chunk size" }, { "cve": "CVE-2020-11996", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1851420" } ], "notes": [ { "category": "description", "text": "A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of RHOSP14 and is only receiving security fixes for Important and Critical flaws.\nApache Tomcat versions as shipped with Red Hat Enterprise Linux 6 and 7 are not affected by this flaw as it doesn\u0027t support HTTP/2 protocol.\nRed Hat Enterprise Linux 8\u0027s Identity Management is using an affected version of Tomcat bundled within PKI servlet engine, however HTTP/2 protocol is not supported by this component.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11996" }, { "category": "external", "summary": "RHBZ#1851420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851420" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11996", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11996" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11996", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11996" }, { "category": "external", "summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202006.mbox/%3Cfd56bc1d-1219-605b-99c7-946bf7bd8ad4%40apache.org%3E", "url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202006.mbox/%3Cfd56bc1d-1219-605b-99c7-946bf7bd8ad4%40apache.org%3E" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M6", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M6" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.56", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.56" }, { "category": "external", "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.36", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.36" } ], "release_date": "2020-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS" }, { "cve": "CVE-2020-13920", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1880101" } ], "notes": [ { "category": "description", "text": "Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the \"jmxrmi\" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: improper authentication allows MITM attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13920" }, { "category": "external", "summary": "RHBZ#1880101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13920", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13920" } ], "release_date": "2020-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: improper authentication allows MITM attack" }, { "cve": "CVE-2020-13934", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1857040" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat, where an h2c direct connection did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests are made, an OutOfMemoryException could occur, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: OutOfMemoryException caused by HTTP/2 connection leak could lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Certificate System 10.0 and Red Hat Enterprise Linux 8\u0027s Identity Management, are using a vulnerable version of Tomcat that is bundled into the pki-servlet-engine component. However, HTTP/2 is not enabled in such a configuration, and it is not possible to trigger the flaw in a supported setup. A future update may fix the code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13934" }, { "category": "external", "summary": "RHBZ#1857040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857040" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13934", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13934" }, { "category": "external", "summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3Cad62f54e-8fd7-e326-25f1-3bdf1ffa3818%40apache.org%3E", "url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3Cad62f54e-8fd7-e326-25f1-3bdf1ffa3818%40apache.org%3E" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7" }, { "category": "external", "summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105", "url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57" }, { "category": "external", "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37" } ], "release_date": "2020-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: OutOfMemoryException caused by HTTP/2 connection leak could lead to DoS" }, { "cve": "CVE-2020-13935", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-07-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1857024" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat, where the payload length in a WebSocket frame was not correctly validated. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Certificate System 10.0 as well as Red Hat Enterprise Linux 8\u0027s Identity Management, are using a vulnerable version of Tomcat, bundled into the pki-servlet-engine component. However, there is no entry point for WebSockets, thus it is not possible to trigger the flaw in a supported setup. A future update may fix the code. Similarly, Red Hat OpenStack Platform 13 does not ship with WebSocket functionality enabled by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13935" }, { "category": "external", "summary": "RHBZ#1857024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13935", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13935" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13935", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13935" }, { "category": "external", "summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E", "url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7" }, { "category": "external", "summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105", "url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57" }, { "category": "external", "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37" } ], "release_date": "2020-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS" }, { "cve": "CVE-2020-13936", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2021-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1937440" } ], "notes": [ { "category": "description", "text": "A flaw was found in velocity. An attacker, able to modify Velocity templates, may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "velocity: arbitrary code execution when attacker is able to modify templates", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) openshift-logging/elasticsearch6-rhel8 container does contain a vulnerable version of velocity. The references to the library only occur in the x-pack component which is an enterprise-only feature of Elasticsearch - hence it has been marked as wontfix as this time and may be fixed in a future release. Additionally the hive container only references velocity in the testutils of the code but the code still exists in the container, as such it has been given a Moderate impact.\n\n* Velocity as shipped with Red Hat Enterprise Linux 6 is not affected because it does not contain the vulnerable code.\n\n* Velocity as shipped with Red Hat Enterprise Linux 7 contains a vulnerable version, but it is used as a dependency for IdM/ipa, which does not use the vulnerable functionality. It has been marked as Moderate for this reason.\n\n* Although velocity shipped in Red Hat Enterprise Linux 8\u0027s pki-deps:10.6 for IdM/ipa is a vulnerable version, the vulnerable code is not used by pki. It has been marked as Low for this reason.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13936" }, { "category": "external", "summary": "RHBZ#1937440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937440" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13936", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13936" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13936", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13936" } ], "release_date": "2021-03-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "velocity: arbitrary code execution when attacker is able to modify templates" }, { "cve": "CVE-2020-13954", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1898235" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: XSS via the styleSheetPath", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13954" }, { "category": "external", "summary": "RHBZ#1898235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898235" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13954", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13954" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Users can disable the service listing altogether by setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: XSS via the styleSheetPath" }, { "cve": "CVE-2020-13956", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-10-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886587" } ], "notes": [ { "category": "description", "text": "Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-httpclient: incorrect handling of malformed authority component in request URIs", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable httpclient library to authenticated users only. Additionally the vulnerable httpclient library is not used directly in OCP components, therefore the impact by this vulnerability is Low.\nIn OCP 4 there are no plans to maintain ose-logging-elasticsearch5 container, hence marked as wontfix.\n\nIn the Red Hat Enterprise Linux platforms, Maven 35 and 36 are affected via their respective `httpcomponents-client` component.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13956" }, { "category": "external", "summary": "RHBZ#1886587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886587" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13956", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13956" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13956", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13956" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/10/08/4", "url": "https://www.openwall.com/lists/oss-security/2020/10/08/4" } ], "release_date": "2020-10-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-httpclient: incorrect handling of malformed authority component in request URIs" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-14297", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853595" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly\u0027s EJB Client, where the accumulation of specific EJB transaction objects over time can cause services to slow down and eventually become unavailable. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Some EJB transaction objects may get accumulated causing Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14297" }, { "category": "external", "summary": "RHBZ#1853595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14297", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14297" } ], "release_date": "2020-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Some EJB transaction objects may get accumulated causing Denial of Service" }, { "cve": "CVE-2020-14338", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1860054" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly\u0027s implementation of Xerces, specifically in the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the \"use-grammar-pool-only\" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as CVE-2020-14621, which affected OpenJDK, and uses a similar code.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14338" }, { "category": "external", "summary": "RHBZ#1860054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860054" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14338", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14338" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14338", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14338" } ], "release_date": "2020-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl" }, { "acknowledgments": [ { "names": [ "Masafumi Miura" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-14340", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1860218" } ], "notes": [ { "category": "description", "text": "A flaw was found in xnio. A file descriptor leak caused by growing amounts of NIO Selector file, handled between garbage collection cycles, may allow the attacker to cause a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14340" }, { "category": "external", "summary": "RHBZ#1860218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860218" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14340", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14340" } ], "release_date": "2020-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS" }, { "cve": "CVE-2020-17510", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903727" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache shiro. When using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. This highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: specially crafted HTTP request may cause an authentication bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst the OpenDaylight version that is included in Red Hat OpenStack Platform includes the affected code, the vulnerable function is not used and therefore not exploitable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-17510" }, { "category": "external", "summary": "RHBZ#1903727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903727" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-17510", "url": "https://www.cve.org/CVERecord?id=CVE-2020-17510" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-17510", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17510" } ], "release_date": "2020-11-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "shiro: specially crafted HTTP request may cause an authentication bypass" }, { "cve": "CVE-2020-17518", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913312" } ], "notes": [ { "category": "description", "text": "Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-flink: directory traversal attack allows remote file writing through the REST API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-17518" }, { "category": "external", "summary": "RHBZ#1913312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-17518", "url": "https://www.cve.org/CVERecord?id=CVE-2020-17518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-17518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17518" } ], "release_date": "2021-01-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-flink: directory traversal attack allows remote file writing through the REST API" }, { "cve": "CVE-2020-25633", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2020-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879042" } ], "notes": [ { "category": "description", "text": "A flaw was found in the RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. This flaw allows client users to obtain the server\u0027s potentially sensitive information when the server receives the WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client\u0027s WebApplicationException handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25633" }, { "category": "external", "summary": "RHBZ#1879042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25633", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25633" } ], "release_date": "2020-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client\u0027s WebApplicationException handling" }, { "cve": "CVE-2020-25638", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2020-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881353" } ], "notes": [ { "category": "description", "text": "A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Process Automation Manager and Red Hat Decision Manager, the kie-server-ee7 zip is primarily for Weblogic/Websphere which is decided to stay on hibernate 5.1.x, it\u0027s not possible to make an upgrade to 5.3.x due to technical reasons. For this reason this fix is included only for kie-server-ee7. For this reason there are two components for RHPAM and RHDM.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25638" }, { "category": "external", "summary": "RHBZ#1881353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25638", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25638" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25638", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25638" } ], "release_date": "2020-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Set hibernate.use_sql_comments to false, which is the default value, or use named parameters instead of literals. Please refer to details in https://docs.jboss.org/hibernate/orm/5.4/userguide/html_single/Hibernate_User_Guide.html#configurations-logging and https://docs.jboss.org/hibernate/orm/5.4/userguide/html_single/Hibernate_User_Guide.html#sql-query-parameters.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used" }, { "cve": "CVE-2020-25640", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2020-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881637" } ], "notes": [ { "category": "description", "text": "A flaw was found in wildfly. JMS passwords are logged by the resource adaptor in plain text at the warning level when a connection error occurs allowing any user that has access to the log to gain access to this sensitive information. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: resource adapter logs plaintext JMS password at warning level on connection error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25640" }, { "category": "external", "summary": "RHBZ#1881637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881637" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25640", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25640" }, { "category": "external", "summary": "https://github.com/amqphub/amqp-10-resource-adapter/issues/13", "url": "https://github.com/amqphub/amqp-10-resource-adapter/issues/13" } ], "release_date": "2020-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: resource adapter logs plaintext JMS password at warning level on connection error" }, { "cve": "CVE-2020-25644", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885485" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25644" }, { "category": "external", "summary": "RHBZ#1885485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885485" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25644", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25644" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25644", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25644" } ], "release_date": "2020-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "There is currently no known mitigation for this issue.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL" }, { "cve": "CVE-2020-26258", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2020-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908832" } ], "notes": [ { "category": "description", "text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.", "title": "Vulnerability description" }, { "category": "summary", "text": "XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) delivers jenkins package with bundled XStream library. Due to JEP-200 Jenkins project [1] and advisory SECURITY-383 [2], OCP jenkins package is not affected by this flaw.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://www.jenkins.io/security/advisory/2017-02-01/ (see SECURITY-383 / CVE-2017-2608)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26258" }, { "category": "external", "summary": "RHBZ#1908832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908832" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26258", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26258" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26258", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26258" } ], "release_date": "2020-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "As recommended, use XStream\u0027s security framework to implement a whitelist for the allowed types.\n\nUsers of XStream 1.4.14 who insist to use XStream default blacklist - despite that clear recommendation - can simply add two lines to XStream\u0027s setup code:\n\nxstream.denyTypes(new String[]{ \"jdk.nashorn.internal.objects.NativeString\" });\nxstream.denyTypesByRegExp(new String[]{ \".*\\\\.ReadAllStream\\\\$FileStream\" });\n\nUsers of XStream 1.4.13 who want to use XStream default blacklist can simply add three lines to XStream\u0027s setup code:\n\nxstream.denyTypes(new String[]{ \"javax.imageio.ImageIO$ContainsFilter\", \"jdk.nashorn.internal.objects.NativeString\" });\nxstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });\nxstream.denyTypesByRegExp(new String[]{ \".*\\\\.ReadAllStream\\\\$FileStream\" });\n\nUsers of XStream 1.4.12 to 1.4.7 who want to use XStream with a blacklist will have to setup such a list from scratch and deny at least the following types: javax.imageio.ImageIO$ContainsFilter, java.beans.EventHandler, java.lang.ProcessBuilder, jdk.nashorn.internal.objects.NativeString, java.lang.Void and void and deny several types by name pattern.\n\nxstream.denyTypes(new String[]{ \"javax.imageio.ImageIO$ContainsFilter\", \"jdk.nashorn.internal.objects.NativeString\" });\nxstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });\nxstream.denyTypesByRegExp(new String[]{ \".*\\\\$LazyIterator\", \"javax\\\\.crypto\\\\..*\", \".*\\\\.ReadAllStream\\\\$FileStream\" });\n\nUsers of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:\n\nxstream.registerConverter(new Converter() {\n public boolean canConvert(Class type) {\n return type != null \u0026\u0026 (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class\n || type.getName().equals(\"javax.imageio.ImageIO$ContainsFilter\") || type.getName().equals(\"jdk.nashorn.internal.objects.NativeString\")\n || type == java.lang.Void.class || void.class || Proxy.isProxy(type)\n || type.getName().startsWith(\"javax.crypto.\") || type.getName().endsWith(\"$LazyIterator\") || type.getName().endsWith(\".ReadAllStream$FileStream\"));\n }\n\n public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {\n throw new ConversionException(\"Unsupported type due to security reasons.\");\n }\n\n public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {\n throw new ConversionException(\"Unsupported type due to security reasons.\");\n }\n}, XStream.PRIORITY_LOW);", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling" }, { "cve": "CVE-2020-26945", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1887257" } ], "notes": [ { "category": "description", "text": "MyBatis before 3.5.6 mishandles deserialization of object streams.", "title": "Vulnerability description" }, { "category": "summary", "text": "mybatis: mishandles deserialization of object streams which could result in remote code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26945" }, { "category": "external", "summary": "RHBZ#1887257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887257" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26945", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26945" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26945", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26945" } ], "release_date": "2020-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mybatis: mishandles deserialization of object streams which could result in remote code execution" }, { "cve": "CVE-2020-27216", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2020-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1891132" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system\u0027s temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: local temporary directory hijacking vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of jetty.\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27216" }, { "category": "external", "summary": "RHBZ#1891132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891132" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27216", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27216" }, { "category": "external", "summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053" } ], "release_date": "2020-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Jetty users should create temp folders outside the normal /tmp structure, and ensure that their permissions are set so as not to be accessible by an attacker.", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: local temporary directory hijacking vulnerability" }, { "cve": "CVE-2020-28052", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912881" } ], "notes": [ { "category": "description", "text": "A flaw was found in bouncycastle. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password allowing incorrect passwords to indicate they were matching with previously hashed ones that were different. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28052" }, { "category": "external", "summary": "RHBZ#1912881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28052", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28052" } ], "release_date": "2020-12-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "workaround", "details": "Users unable to upgrade to version 1.67 or greater can copy the `OpenBSDBCrypt.doCheckPassword()` method implementation (https://github.com/bcgit/bc-java/blob/r1rv67/core/src/main/java/org/bouncycastle/crypto/generators/OpenBSDBCrypt.java#L259-L343) into their own utility class and supplement it with the required methods and variables as required", "product_ids": [ "Red Hat Fuse 7.9" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible" }, { "cve": "CVE-2021-27568", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1939839" } ], "notes": [ { "category": "description", "text": "A flaw was found in json-smart. When an exception is thrown from a function, but is not caught, the program using the library may crash or expose sensitive information. The highest threat from this vulnerability is to data confidentiality and system availability.\r\n\r\nIn OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of json-smart package.\r\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\r\nThis may be fixed in the future.\r\n\r\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Vulnerability description" }, { "category": "summary", "text": "json-smart: uncaught exception may lead to crash or information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27568" }, { "category": "external", "summary": "RHBZ#1939839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939839" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27568", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27568" } ], "release_date": "2021-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "json-smart: uncaught exception may lead to crash or information disclosure" }, { "cve": "CVE-2021-27807", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941055" } ], "notes": [ { "category": "description", "text": "A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.", "title": "Vulnerability description" }, { "category": "summary", "text": "pdfbox: infinite loop while loading a crafted PDF file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27807" }, { "category": "external", "summary": "RHBZ#1941055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941055" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27807", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27807" } ], "release_date": "2021-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pdfbox: infinite loop while loading a crafted PDF file" }, { "cve": "CVE-2021-27906", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941050" } ], "notes": [ { "category": "description", "text": "A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.", "title": "Vulnerability description" }, { "category": "summary", "text": "pdfbox: OutOfMemory-Exception while loading a crafted PDF file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27906" }, { "category": "external", "summary": "RHBZ#1941050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27906", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27906" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27906", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27906" } ], "release_date": "2021-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pdfbox: OutOfMemory-Exception while loading a crafted PDF file" }, { "cve": "CVE-2021-28165", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945714" } ], "notes": [ { "category": "description", "text": "When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing high CPU resources utilization. The highest threat from this vulnerability is to service availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: Resource exhaustion when receiving an invalid large TLS frame", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the hive/presto/hadoop components that comprise the OCP metering stack, ship the vulnerable version of jetty.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated\n\nRed Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28165" }, { "category": "external", "summary": "RHBZ#1945714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945714" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28165", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28165" }, { "category": "external", "summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w" } ], "release_date": "2021-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.9.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/", "product_ids": [ "Red Hat Fuse 7.9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.9" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: Resource exhaustion when receiving an invalid large TLS frame" } ] }
rhsa-2020_3372
Vulnerability from csaf_redhat
Published
2020-08-06 20:21
Modified
2024-09-18 04:26
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container security update
Notes
Topic
An update for 3scale-istio-adapter-rhel8-container is now available for OpenShift Service Mesh.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for 3scale-istio-adapter-rhel8-container is now available for OpenShift Service Mesh.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3372", "url": "https://access.redhat.com/errata/RHSA-2020:3372" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "MAISTRA-1716", "url": "https://issues.redhat.com/browse/MAISTRA-1716" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_3372.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container security update", "tracking": { "current_release_date": "2024-09-18T04:26:13+00:00", "generator": { "date": "2024-09-18T04:26:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:3372", "initial_release_date": "2020-08-06T20:21:37+00:00", "revision_history": [ { "date": "2020-08-06T20:21:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-08-06T20:21:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:26:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.0", "product": { "name": "OpenShift Service Mesh 1.0", "product_id": "8Base-OSSM-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64", "product": { "name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64", "product_id": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64", "product_identification_helper": { "purl": "pkg:oci/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/3scale-istio-adapter-rhel8\u0026tag=1.0.0-8" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64 as a component of OpenShift Service Mesh 1.0", "product_id": "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64" }, "product_reference": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64", "relates_to_product_reference": "8Base-OSSM-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-9283", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2020-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1804533" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform uses the vulnerable library in a number of components but strictly as an SSH client. The severity of this vulnerability is reduced for clients as it requires connections to malicious SSH servers, with the maximum impact only a client crash. This vulnerability is rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9283" }, { "category": "external", "summary": "RHBZ#1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY", "url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY" } ], "release_date": "2020-02-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3372" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3372" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:fcae2ea5da6d94016b2502f277b1a7fd3e29d0357fc727fcd61963026d22e607_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2020_4694
Vulnerability from csaf_redhat
Published
2020-11-04 01:34
Modified
2024-09-18 04:27
Summary
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
Notes
Topic
An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)
* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)\n\n* QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4694", "url": "https://access.redhat.com/errata/RHSA-2020:4694" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/" }, { "category": "external", "summary": "1682970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1682970" }, { "category": "external", "summary": "1752079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752079" }, { "category": "external", "summary": "1785242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785242" }, { "category": "external", "summary": "1800815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1800815" }, { "category": "external", "summary": "1801874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801874" }, { "category": "external", "summary": "1804193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804193" }, { "category": "external", "summary": "1804195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804195" }, { "category": "external", "summary": "1813845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813845" }, { "category": "external", "summary": "1814928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814928" }, { "category": "external", "summary": "1818694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1818694" }, { "category": "external", "summary": "1821193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821193" }, { "category": "external", "summary": "1822038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822038" }, { "category": "external", "summary": "1825789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825789" }, { "category": "external", "summary": "1827794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827794" }, { "category": "external", "summary": "1833220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833220" }, { "category": "external", "summary": "1835986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835986" }, { "category": "external", "summary": "1837755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837755" }, { "category": "external", "summary": "1847544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847544" }, { "category": "external", "summary": "1849557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849557" }, { "category": "external", "summary": "1850230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850230" }, { "category": "external", "summary": "1853230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853230" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1857606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857606" }, { "category": "external", "summary": "1858862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858862" }, { "category": "external", "summary": "1860126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860126" }, { "category": "external", "summary": "1866153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866153" }, { "category": "external", "summary": "1866833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866833" }, { "category": "external", "summary": "1867447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867447" }, { "category": "external", "summary": "1868612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868612" }, { "category": "external", "summary": "1872263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872263" }, { "category": "external", "summary": "1877463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877463" }, { "category": "external", "summary": "1879622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879622" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_4694.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-09-18T04:27:23+00:00", "generator": { "date": "2024-09-18T04:27:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:4694", "initial_release_date": "2020-11-04T01:34:32+00:00", "revision_history": [ { "date": "2020-11-04T01:34:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-04T01:34:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:27:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8030020200923153805:2a301c24", "product": { "name": "container-tools:rhel8:8030020200923153805:2a301c24", "product_id": "container-tools:rhel8:8030020200923153805:2a301c24", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@rhel8:8030020200923153805:2a301c24" } } }, { "category": "product_version", "name": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "product": { "name": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "product_id": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@18.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "product": { "name": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "product_id": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "product": { "name": "podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "product_id": "podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=noarch" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "product": { "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "product_id": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-podman-api@1.2.0-0.2.gitd0a45fe.module%2Bel8.3.0%2B8221%2B97165c3f?arch=noarch" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "product": { "name": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "product_id": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=noarch" } } }, { "category": "product_version", "name": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "product": { "name": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "product_id": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.2-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "product": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "product_id": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "product": { "name": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "product_id": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@18.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "product": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "product_id": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.20-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "product": { "name": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "product_id": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "product": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "product_id": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "product": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "product_id": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "product": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "product_id": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "product": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "product_id": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "product": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "product_id": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "product": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "product_id": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "product": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "product_id": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "product": { "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "product_id": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-podman-api@1.2.0-0.2.gitd0a45fe.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "product": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "product_id": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "product": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "product_id": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "product": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "product_id": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "product": { "name": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "product_id": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } }, { "category": "product_version", "name": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src", "product": { "name": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src", "product_id": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.2-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.20-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "product": { "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "product_id": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.20-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product_id": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product_id": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product_id": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product_id": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_id": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_id": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_id": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_id": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_id": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_id": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_id": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_id": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "product_id": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "product_id": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "product_id": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_id": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "product": { "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "product_id": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.20-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "product": { "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_id": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.15.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.20-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@0.14.1-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.3.1-1.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.1.2-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@2.0.5-5.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.14-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-68.rc92.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "product": { "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "product_id": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.4-2.module%2Bel8.3.0%2B8221%2B97165c3f?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, "product_reference": "container-tools:rhel8:8030020200923153805:2a301c24", "relates_to_product_reference": "AppStream-8.3.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch" }, "product_reference": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch" }, "product_reference": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch" }, "product_reference": "podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch" }, "product_reference": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64" }, "product_reference": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x" }, "product_reference": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64 as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64" }, "product_reference": "slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch" }, "product_reference": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch" }, "product_reference": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src as a component of container-tools:rhel8:8030020200923153805:2a301c24 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" }, "product_reference": "udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src", "relates_to_product_reference": "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Etienne Champetier" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-10749", "cwe": { "id": "CWE-300", "name": "Channel Accessible by Non-Endpoint" }, "discovery_date": "2020-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1833220" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in affected container networking implementations that allow malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending \u201crogue\u201d IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.", "title": "Vulnerability description" }, { "category": "summary", "text": "containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform 4, the default network plugin, OpenShift SDN, and OVN Kubernetes, do not forward IPv6 traffic, making this vulnerability not exploitable. The affected code from containernetworking/plugins is however still included in these plugins, hence this vulnerability is rated Low for both OpenShift SDN and OVN-Kubernetes.\n\nIPv6 traffic is not forwarded by the OpenShift SDN in OpenShift Container Platform 3.11, making this vulnerability not exploitable. However, the affected code from containernetworking/plugins is still included in the atomic-openshift package, hence this vulnerability is rated Low for OpenShift Container Platform 3.11.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10749" }, { "category": "external", "summary": "RHBZ#1833220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10749", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10749" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8" } ], "release_date": "2020-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4694" }, { "category": "workaround", "details": "Prevent untrusted, non-privileged containers from running with CAP_NET_RAW.", "product_ids": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters" }, { "acknowledgments": [ { "names": [ "Ziming Zhang" ], "organization": "Qi An Xin Group" }, { "names": [ "VictorV" ], "organization": "360 Vulcan Team" } ], "cve": "CVE-2020-10756", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1835986" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "QEMU: slirp: networking out-of-bounds read information disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw did not affect the versions of SLiRP embedded in `qemu-kvm` as shipped with Red Hat Enterprise Linux 6 and 7, as they did not include support for ICMPv6, which was introduced in a later version of the package.\n\nOpenShift 4.x packages slirp4netns as a dependency of podman however podman doesn\u0027t set the --enable-ipv6 flag. Hence the impact has been reduced to low, as the code is still being packaged and podman might decide to enable IPv6 in future.\n\nIn Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP qemu-kvm-rhev package.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10756" }, { "category": "external", "summary": "RHBZ#1835986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835986" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10756", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10756" }, { "category": "external", "summary": "https://www.zerodayinitiative.com/advisories/ZDI-20-1005/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1005/" } ], "release_date": "2020-05-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4694" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "QEMU: slirp: networking out-of-bounds read information disclosure vulnerability" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4694" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-debugsource-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:buildah-tests-debuginfo-0:1.15.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:cockpit-podman-0:18.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:conmon-2:2.0.20-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:container-selinux-2:2.144.0-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debuginfo-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containernetworking-plugins-debugsource-0:0.8.6-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:containers-common-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crit-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debuginfo-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:criu-debugsource-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debuginfo-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:crun-debugsource-0:0.14.1-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:fuse-overlayfs-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debuginfo-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-debugsource-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:libslirp-devel-0:4.3.1-1.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debuginfo-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:oci-seccomp-bpf-hook-debugsource-0:1.1.2-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-catatonit-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-debugsource-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-docker-0:2.0.5-5.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-remote-debuginfo-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:podman-tests-0:2.0.5-5.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python-podman-api-0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:python3-criu-0:3.14-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debuginfo-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:runc-debugsource-0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debuginfo-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-debugsource-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:skopeo-tests-1:1.1.1-3.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debuginfo-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.aarch64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.ppc64le", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.s390x", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:slirp4netns-debugsource-0:1.1.4-2.module+el8.3.0+8221+97165c3f.x86_64", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:toolbox-0:0.0.8-1.module+el8.3.0+8221+97165c3f.src", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.noarch", "AppStream-8.3.0.GA:container-tools:rhel8:8030020200923153805:2a301c24:udica-0:0.2.2-1.module+el8.3.0+8221+97165c3f.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2021_0420
Vulnerability from csaf_redhat
Published
2021-02-04 16:14
Modified
2024-09-18 04:28
Summary
Red Hat Security Advisory: Red Hat Quay v3.4.0 security update
Notes
Topic
Red Hat Quay 3.4.0 is now available with bug fixes and various
enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Quay 3.4.0 release
Security Fix(es):
* waitress: HTTP request smuggling through LF vs CRLF handling (CVE-2019-16785)
* waitress: HTTP request smuggling through invalid Transfer-Encoding (CVE-2019-16786)
* waitress: HTTP Request Smuggling through Invalid whitespace characters in headers (CVE-2019-16789)
* python-pillow: Integer overflow leading to buffer overflow in ImagingLibTiffDecode (CVE-2020-5310)
* python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c (CVE-2020-5311)
* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)
* python-pillow: two buffer overflows in libImaging/TiffDecode.c due to small buffers allocated in ImagingLibTiffDecode() (CVE-2020-10379)
* python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2 (CVE-2020-11538)
* openstack-mistral: information disclosure in mistral log (CVE-2019-3866)
* python-pillow: uncontrolled resource consumption in FpxImagePlugin.py (CVE-2019-19911)
* PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477)
* python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)
* yarn: Arbitrary filesystem write via tar expansion (CVE-2020-8131)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* python-pillow: multiple out-of-bounds reads in libImaging/FliDecode.c (CVE-2020-10177)
* python-pillow: an out-of-bounds read in libImaging/PcxDecode.c can occur when reading PCX files (CVE-2020-10378)
* python-pillow: multiple out-of-bounds reads via a crafted JP2 file (CVE-2020-10994)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Quay 3.4.0 is now available with bug fixes and various\nenhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Quay 3.4.0 release\n\nSecurity Fix(es):\n\n* waitress: HTTP request smuggling through LF vs CRLF handling (CVE-2019-16785)\n\n* waitress: HTTP request smuggling through invalid Transfer-Encoding (CVE-2019-16786)\n\n* waitress: HTTP Request Smuggling through Invalid whitespace characters in headers (CVE-2019-16789)\n\n* python-pillow: Integer overflow leading to buffer overflow in ImagingLibTiffDecode (CVE-2020-5310)\n\n* python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c (CVE-2020-5311)\n\n* python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312)\n\n* python-pillow: two buffer overflows in libImaging/TiffDecode.c due to small buffers allocated in ImagingLibTiffDecode() (CVE-2020-10379)\n\n* python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2 (CVE-2020-11538)\n\n* openstack-mistral: information disclosure in mistral log (CVE-2019-3866)\n\n* python-pillow: uncontrolled resource consumption in FpxImagePlugin.py (CVE-2019-19911)\n\n* PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477)\n\n* python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)\n\n* yarn: Arbitrary filesystem write via tar expansion (CVE-2020-8131)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* python-pillow: multiple out-of-bounds reads in libImaging/FliDecode.c (CVE-2020-10177)\n\n* python-pillow: an out-of-bounds read in libImaging/PcxDecode.c can occur when reading PCX files (CVE-2020-10378)\n\n* python-pillow: multiple out-of-bounds reads via a crafted JP2 file (CVE-2020-10994)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0420", "url": "https://access.redhat.com/errata/RHSA-2021:0420" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1768731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768731" }, { "category": "external", "summary": "1789532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789532" }, { "category": "external", "summary": "1789533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789533" }, { "category": "external", "summary": "1789535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789535" }, { "category": "external", "summary": "1789538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789538" }, { "category": "external", "summary": "1789540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789540" }, { "category": "external", "summary": "1789807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789807" }, { "category": "external", "summary": "1791415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791415" }, { "category": "external", "summary": "1791420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791420" }, { "category": "external", "summary": "1806005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806005" }, { "category": "external", "summary": "1816261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816261" }, { "category": "external", "summary": "1852814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852814" }, { "category": "external", "summary": "1852820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852820" }, { "category": "external", "summary": "1852824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852824" }, { "category": "external", "summary": "1852832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852832" }, { "category": "external", "summary": "1852836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852836" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0420.json" } ], "title": "Red Hat Security Advisory: Red Hat Quay v3.4.0 security update", "tracking": { "current_release_date": "2024-09-18T04:28:14+00:00", "generator": { "date": "2024-09-18T04:28:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0420", "initial_release_date": "2021-02-04T16:14:00+00:00", "revision_history": [ { "date": "2021-02-04T16:14:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-04T16:14:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:28:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Quay v3", "product": { "name": "Quay v3", "product_id": "8Base-Quay-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:quay:3::el8" } } } ], "category": "product_family", "name": "Red Hat Quay" }, { "branches": [ { "category": "product_version", "name": "quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "product": { "name": "quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "product_id": "quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-bridge-operator-bundle\u0026tag=v3.4.0-3" } } }, { "category": "product_version", "name": "quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "product": { "name": "quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "product_id": "quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-bridge-operator-rhel8\u0026tag=v3.4.0-17" } } }, { "category": "product_version", "name": "quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "product": { "name": "quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "product_id": "quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-openshift-bridge-rhel8-operator\u0026tag=v3.4.0-17" } } }, { "category": "product_version", "name": "quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "product": { "name": "quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "product_id": "quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-builder-rhel8\u0026tag=v3.4.0-18" } } }, { "category": "product_version", "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "product": { "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "product_id": "quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8\u0026tag=v3.4.0-17" } } }, { "category": "product_version", "name": "quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "product": { "name": "quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "product_id": "quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "product_identification_helper": { "purl": "pkg:oci/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d?arch=amd64\u0026repository_url=registry.redhat.io/quay/clair-rhel8\u0026tag=v3.4.0-25" } } }, { "category": "product_version", "name": "quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "product": { "name": "quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "product_id": "quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-container-security-operator-bundle\u0026tag=v3.4.0-2" } } }, { "category": "product_version", "name": "quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "product": { "name": "quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "product_id": "quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-container-security-operator-rhel8\u0026tag=v3.4.0-2" } } }, { "category": "product_version", "name": "quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "product": { "name": "quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "product_id": "quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-operator-bundle\u0026tag=v3.4.0-89" } } }, { "category": "product_version", "name": "quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "product": { "name": "quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "product_id": "quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-operator-rhel8\u0026tag=v3.4.0-132" } } }, { "category": "product_version", "name": "quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64", "product": { "name": "quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64", "product_id": "quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64", "product_identification_helper": { "purl": "pkg:oci/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f?arch=amd64\u0026repository_url=registry.redhat.io/quay/quay-rhel8\u0026tag=v3.4.0-51" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64" }, "product_reference": "quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64" }, "product_reference": "quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64" }, "product_reference": "quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64" }, "product_reference": "quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64" }, "product_reference": "quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64" }, "product_reference": "quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64" }, "product_reference": "quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64" }, "product_reference": "quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64" }, "product_reference": "quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64" }, "product_reference": "quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "relates_to_product_reference": "8Base-Quay-3" }, { "category": "default_component_of", "full_product_name": { "name": "quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64 as a component of Quay v3", "product_id": "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" }, "product_reference": "quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64", "relates_to_product_reference": "8Base-Quay-3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenStack project" ] }, { "names": [ "Gauvain Pocentek and Cl\u00e9ment Beaufils" ], "organization": "Kindred Group PLC", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2019-3866", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1768731" } ], "notes": [ { "category": "description", "text": "An information-exposure vulnerability was discovered where openstack-mistral\u0027s undercloud log files containing clear-text information were made world readable. A malicious system user could exploit this flaw to access sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-mistral: information disclosure in mistral log", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenStack Platform 10/13, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP10/13 openstack-mistral package.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3866" }, { "category": "external", "summary": "RHBZ#1768731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768731" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3866", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3866" } ], "release_date": "2019-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" }, { "category": "workaround", "details": "Plain text information can be masked by ensuring that all mistral log files are not world readable.", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-mistral: information disclosure in mistral log" }, { "cve": "CVE-2019-16785", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1791420" } ], "notes": [ { "category": "description", "text": "An HTTP-request vulnerability was discovered in Waitress which implemented a \"MAY\" part of the RFC7230 which states: \"Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR.\" Unfortunately, if a front-end server does not process header fields with an LF the same way as it processes those with a CRLF, it can lead to the front-end and the back-end server processing the same HTTP message in two different ways. This vulnerability can lead to a potential for HTTP request smuggling and splitting where Waitress may see two requests, while the front-end server only sees a single HTTP message.", "title": "Vulnerability description" }, { "category": "summary", "text": "waitress: HTTP request smuggling through LF vs CRLF handling", "title": "Vulnerability summary" }, { "category": "other", "text": "All affected Red Hat products ship but do not use the flawed version of python-waitress. The impact for these products is therefore rated as having a security impact of Low.\n\nIn Red Hat OpenStack Platform 13, because the flawed code is not used and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP13 python-waitress package.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16785" }, { "category": "external", "summary": "RHBZ#1791420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791420" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16785", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16785" }, { "category": "external", "summary": "https://docs.pylonsproject.org/projects/waitress/en/latest/#id6", "url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#id6" } ], "release_date": "2019-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "waitress: HTTP request smuggling through LF vs CRLF handling" }, { "cve": "CVE-2019-16786", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1791415" } ], "notes": [ { "category": "description", "text": "An HTTP-interpretation flaw was found in waitress which did not properly validate incoming HTTP headers. When parsing the Transfer-Encoding header, waitress would look only for a single string value. According to the HTTP standard, Transfer-Encoding should be a comma-separated list, with the inner-most encoding first, followed by any further transfer codings, ending with \u0027chunked\u0027. Because of this flaw, requests sent with: \"Transfer-Encoding: gzip, chunked\" would get ignored, and waitress would use the Content-Length header instead to determine the body size of the HTTP message. A remote attacker could exploit this flaw to force waitress to accept potentially bad HTTP requests or treat a single request as multiple requests in the case of HTTP pipelining.", "title": "Vulnerability description" }, { "category": "summary", "text": "waitress: HTTP request smuggling through invalid Transfer-Encoding", "title": "Vulnerability summary" }, { "category": "other", "text": "All affected Red Hat products ship but do not use the flawed version of python-waitress. The impact for these products is therefore rated as having a security impact of Low.\n\nIn Red Hat OpenStack Platform 13, because the flawed code is not used and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP13 python-waitress package.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16786" }, { "category": "external", "summary": "RHBZ#1791415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16786", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16786" }, { "category": "external", "summary": "https://docs.pylonsproject.org/projects/waitress/en/latest/#id6", "url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#id6" } ], "release_date": "2019-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "waitress: HTTP request smuggling through invalid Transfer-Encoding" }, { "cve": "CVE-2019-16789", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789807" } ], "notes": [ { "category": "description", "text": "An HTTP-interpretation flaw was found in waitress, through version 1.4.0. If a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server, an HTTP request splitting could occur which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation. The highest threat from this vulnerability is data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "waitress: HTTP Request Smuggling through Invalid whitespace characters in headers", "title": "Vulnerability summary" }, { "category": "other", "text": "All affected Red Hat products ship but do not use the flawed version of python-waitress. The impact for these products is therefore rated as having a security impact of Low.\n\nFor Red Hat OpenStack Platform 13, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP13 python-waitress package.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16789" }, { "category": "external", "summary": "RHBZ#1789807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16789", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16789" }, { "category": "external", "summary": "https://docs.pylonsproject.org/projects/waitress/en/latest/#id2", "url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#id2" } ], "release_date": "2019-12-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "waitress: HTTP Request Smuggling through Invalid whitespace characters in headers" }, { "cve": "CVE-2019-19911", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789540" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in Pillow in versions before 6.2.2, where the FpxImagePlugin.py file calls the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows systems running 32-bit Python, this flaw results in an OverflowError or MemoryError due to the 2 GB limit. On Linux systems running 64-bit Python, this flaw results in the termination of the process by the out-of-memory (OOM) killer. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: uncontrolled resource consumption in FpxImagePlugin.py", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of python-pillow as shipped with Red Hat Enterprise Linux 7, and 8 as they did not include python-olefile, which is necessary to use the FPX image plugin.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19911" }, { "category": "external", "summary": "RHBZ#1789540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19911", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19911" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19911", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19911" } ], "release_date": "2020-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-pillow: uncontrolled resource consumption in FpxImagePlugin.py" }, { "cve": "CVE-2019-20477", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1806005" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the PyYAML library, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/apply constructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "PyYAML: command execution through python/object/apply constructor in FullLoader", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of PyYAML as shipped with Red Hat Enterprise Linux 7, and 8 as they did not include the class FullLoader, which contains this vulnerability.\n\nThe PyYAML libary that is provided in the Red Hat OpenStack repositories is vulnerable. However, because there are no instances where this library is used in a way which exposes the vulnerability, the impact to OpenStack products has been reduced to \u0027low\u0027 and Red Hat will not be providing a fix at this time. Any updates will be through RHEL channels.\n\nRed Hat Quay 3.2 uses the vulnerable load function, but only to parse the Nginx configuration file, which only contains trusted data.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20477" }, { "category": "external", "summary": "RHBZ#1806005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20477", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20477" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" }, { "category": "workaround", "details": "Use `yaml.safe_load` or the SafeLoader loader when you parse untrusted input.", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "PyYAML: command execution through python/object/apply constructor in FullLoader" }, { "cve": "CVE-2020-5310", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789538" } ], "notes": [ { "category": "description", "text": "libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: Integer overflow leading to buffer overflow in ImagingLibTiffDecode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of python-pillow as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8 as they did not include support for tiled TIFF images, where the flaw lies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-5310" }, { "category": "external", "summary": "RHBZ#1789538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-5310", "url": "https://www.cve.org/CVERecord?id=CVE-2020-5310" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-5310", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5310" } ], "release_date": "2020-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-pillow: Integer overflow leading to buffer overflow in ImagingLibTiffDecode" }, { "cve": "CVE-2020-5311", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789535" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was discovered in python-pillow in the way SGI RLE images are decoded. An application that uses python-pillow to decode untrusted images may be vulnerable to this flaw, which can allow an attacker to crash the application or potentially execute code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of python-pillow and python-imaging as shipped with Red Hat Enterprise Linux 6, and 7 as they did not include the SGI RLE image decoder, where the flaw lies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-5311" }, { "category": "external", "summary": "RHBZ#1789535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789535" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-5311", "url": "https://www.cve.org/CVERecord?id=CVE-2020-5311" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-5311", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5311" } ], "release_date": "2020-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c" }, { "cve": "CVE-2020-5312", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789533" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in python-pillow does where it does not properly restrict operations within the bounds of a memory buffer when decoding PCX images. An application that uses python-pillow to decode untrusted images may be vulnerable to this flaw, which can allow an attacker to crash the application or potentially execute code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-5312" }, { "category": "external", "summary": "RHBZ#1789533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-5312", "url": "https://www.cve.org/CVERecord?id=CVE-2020-5312" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-5312", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5312" } ], "release_date": "2020-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c" }, { "cve": "CVE-2020-5313", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789532" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read was discovered in python-pillow in the way it decodes FLI images. An application that uses python-pillow to load untrusted images may be vulnerable to this flaw, which can allow an attacker to read the memory of the application they should be not allowed to read.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-5313" }, { "category": "external", "summary": "RHBZ#1789532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-5313", "url": "https://www.cve.org/CVERecord?id=CVE-2020-5313" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-5313", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5313" } ], "release_date": "2020-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images" }, { "cve": "CVE-2020-8131", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816261" } ], "notes": [ { "category": "description", "text": "An arbitrary file write flaw was found in Yarn. This flaw allows an attacker to write files to a user\u2019s system in unexpected places, potentially leading to remote code execution. The attacker would need to first trick a developer into installing a malicious package.", "title": "Vulnerability description" }, { "category": "summary", "text": "yarn: Arbitrary filesystem write via tar expansion", "title": "Vulnerability summary" }, { "category": "other", "text": "Normally yarn allows packages to run postinstall scripts which can write arbitrary files to the users system. This vulnerability allows an attacker to better hide the attack and also allow arbitrary file write when postinstall scripts are disabled with the \u0027--ignore-scripts\u0027 option of \u0027yarn install\u0027.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8131" }, { "category": "external", "summary": "RHBZ#1816261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816261" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8131", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8131" } ], "release_date": "2020-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "yarn: Arbitrary filesystem write via tar expansion" }, { "cve": "CVE-2020-10177", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1852824" } ], "notes": [ { "category": "description", "text": "A flaw was found in python-pillow. Multiple out-of-bounds reads occur in libImaging/FliDecode.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: multiple out-of-bounds reads in libImaging/FliDecode.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10177" }, { "category": "external", "summary": "RHBZ#1852824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10177", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10177" } ], "release_date": "2020-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-pillow: multiple out-of-bounds reads in libImaging/FliDecode.c" }, { "cve": "CVE-2020-10378", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1852832" } ], "notes": [ { "category": "description", "text": "A flaw was found in python-pillow. In libImaging/PcxDecode.c, an out-of-bounds read occurs when reading PCX files where state-\u003eshuffle is instructed to read beyond state-\u003ebuffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: an out-of-bounds read in libImaging/PcxDecode.c can occur when reading PCX files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10378" }, { "category": "external", "summary": "RHBZ#1852832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852832" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10378", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10378" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10378", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10378" } ], "release_date": "2020-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-pillow: an out-of-bounds read in libImaging/PcxDecode.c can occur when reading PCX files" }, { "cve": "CVE-2020-10379", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1852836" } ], "notes": [ { "category": "description", "text": "In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: two buffer overflows in libImaging/TiffDecode.c due to small buffers allocated in ImagingLibTiffDecode()", "title": "Vulnerability summary" }, { "category": "other", "text": "While python-pillow is listed as a dependency of Red Hat Quay, it is not used by the application.\n\nThis issue did not affect the versions of python-pillow as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8 as they provide an older version of the code which does not include the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10379" }, { "category": "external", "summary": "RHBZ#1852836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10379", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10379" } ], "release_date": "2020-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-pillow: two buffer overflows in libImaging/TiffDecode.c due to small buffers allocated in ImagingLibTiffDecode()" }, { "cve": "CVE-2020-10994", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1852820" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in python-pillow in the way JP2 images are parsed. An application that uses python-pillow to decode untrusted images may be vulnerable to this issue. This flaw allows an attacker to read data. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: multiple out-of-bounds reads via a crafted JP2 file", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of python-pillow and python-imaging as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they did not include the JP2 image parser, where the flaw lies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10994" }, { "category": "external", "summary": "RHBZ#1852820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852820" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10994", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10994" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10994", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10994" } ], "release_date": "2020-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-pillow: multiple out-of-bounds reads via a crafted JP2 file" }, { "cve": "CVE-2020-11538", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1852814" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write flaw was found in python-pillow, in the way SGI RLE images are decoded. An application that uses python-pillow to decode untrusted images may be vulnerable. This flaw allows an attacker to crash the application or potentially execute code on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of python-pillow and python-imaging as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they did not include the SGI RLE image decoder, where the flaw lies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11538" }, { "category": "external", "summary": "RHBZ#1852814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852814" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11538", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11538" } ], "release_date": "2020-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0420" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Quay-3:quay/clair-rhel8@sha256:32d29a9bc9e6f4690d75b432bc36de8555828c7ecabe405f50add88140a13b2d_amd64", "8Base-Quay-3:quay/quay-bridge-operator-bundle@sha256:cc204e9e439a64232673f7b3c1071ce7d1eee16c0f101688b276aa30eda55b06_amd64", "8Base-Quay-3:quay/quay-bridge-operator-rhel8@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-builder-qemu-rhcos-rhel8@sha256:324e4fd85bad0dd77f351b1c946040b0be639a63b4f90150e42739efde98a21c_amd64", "8Base-Quay-3:quay/quay-builder-rhel8@sha256:afc774b0aa286a1a72143ae0ae3491dc6f6005b487bac20c10495c8d98b82165_amd64", "8Base-Quay-3:quay/quay-container-security-operator-bundle@sha256:70581e0c0ff015d0cb09caeb0e7d76714cd7903df04ae428003c3f8dc3fdb4a3_amd64", "8Base-Quay-3:quay/quay-container-security-operator-rhel8@sha256:c3642669da261c8a7ee458fcba98abde522bf51e8695c30077840c787abc987e_amd64", "8Base-Quay-3:quay/quay-openshift-bridge-rhel8-operator@sha256:74af7b3f0fdd7c72395eb4628ded5c38f098bf11bccc5cfba2f4c5698911246c_amd64", "8Base-Quay-3:quay/quay-operator-bundle@sha256:87a68e36f451d24a493f25a2302897f7009ed7742e405e8e45988837c8b9c7f4_amd64", "8Base-Quay-3:quay/quay-operator-rhel8@sha256:7bf688be0d6a587c14316c6df81b3a59dba8c308842b67d016bedaedfad95c98_amd64", "8Base-Quay-3:quay/quay-rhel8@sha256:bdded901debc402b5e5b85bfd3476cc9feda213b846abb2d3ca91d6d91acb34f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2020_5635
Vulnerability from csaf_redhat
Published
2021-02-24 15:00
Modified
2023-01-26 01:24
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.7.0 extras and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.7.0 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release also includes a security update for Red Hat OpenShift Container Platform 4.7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.7.0. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHEA-2020:5633
All OpenShift Container Platform users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
-between-minor.html#understanding-upgrade-channels_updating-cluster-between
-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.7.0 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release also includes a security update for Red Hat OpenShift Container Platform 4.7.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.7.0. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHEA-2020:5633\n\nAll OpenShift Container Platform users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5635", "url": "https://access.redhat.com/errata/RHSA-2020:5635" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2020_5635.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.0 extras and security update", "tracking": { "current_release_date": "2023-01-26T01:24:00Z", "generator": { "date": "2023-07-01T04:35:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2020:5635", "initial_release_date": "2021-02-24T15:00:00Z", "revision_history": [ { "date": "2023-01-26T01:24:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8:v4.7.0-202102120026.p0", "product": { "name": "openshift4/network-tools-rhel8:v4.7.0-202102120026.p0", "product_id": "openshift4/network-tools-rhel8:v4.7.0-202102120026.p0" } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-ansible-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-ansible-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "product": { "name": "openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "product_id": "openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0" } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-descheduler:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-descheduler:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-descheduler:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-egress-router:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-egress-router:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-egress-router:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-ghostunnel:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-ghostunnel:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-ghostunnel:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-helm-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-helm-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-helm-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-metering-hive:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-metering-hive:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-metering-hive:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-metering-presto:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-metering-presto:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-metering-presto:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-ptp-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-ptp-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-ptp:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-ptp:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-ptp:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-sriov-cni:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-sriov-cni:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0" } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0", "product": { "name": "openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0", "product_id": "openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0" } } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8:v4.7.0-202102120026.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/network-tools-rhel8:v4.7.0-202102120026.p0" }, "product_reference": "openshift4/network-tools-rhel8:v4.7.0-202102120026.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ansible-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-ansible-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0" }, "product_reference": "openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-descheduler:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-descheduler:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-egress-router:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-egress-router:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ghostunnel:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ghostunnel:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-ghostunnel:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-helm-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-helm-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-hive:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-hive:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-metering-hive:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-presto:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-presto:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-metering-presto:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ptp-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-ptp-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ptp:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-ptp:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-cni:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-sriov-cni:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0" }, "product_reference": "openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8:v4.7.0-202102120026.p0", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-descheduler:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-router:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-helm-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hive:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-presto:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8:v4.7.0-202102120026.p0", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-descheduler:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-router:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-helm-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hive:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-presto:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" }, { "category": "external", "summary": "CVE-2020-14040", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "bz#1853652: CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "release_date": "2020-06-17T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5635" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-24750", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-09-18T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8:v4.7.0-202102120026.p0", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-descheduler:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-router:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-helm-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hive:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.6. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-metering-presto:v4.7.0-202102110027.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8:v4.7.0-202102120026.p0", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-descheduler:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-router:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-helm-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hive:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24750", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750" }, { "category": "external", "summary": "CVE-2020-24750", "url": "https://access.redhat.com/security/cve/CVE-2020-24750" }, { "category": "external", "summary": "bz#1882310: CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" } ], "release_date": "2020-09-18T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-metering-presto:v4.7.0-202102110027.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5635" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-metering-presto:v4.7.0-202102110027.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-09-18T00:00:00Z", "details": "Important" } ], "title": "CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8:v4.7.0-202102120026.p0", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-descheduler:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-router:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-helm-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hive:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-presto:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/kubernetes-nmstate-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/network-tools-rhel8:v4.7.0-202102120026.p0", "8Base-RHOSE-4.7:openshift4/ose-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-descheduler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-clusterresourceoverride-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-descheduler:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-dns-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-http-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-egress-router:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ghostunnel:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-helm-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-10-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-kubernetes-nmstate-handler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-leader-elector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-diskmaker:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-mustgather-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-ansible-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hadoop:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-helm-container-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-hive:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-presto:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-metering-reporting-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-node-problem-detector-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-sdk-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-ptp:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-service-idler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-dp-admission-controller:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-infiniband-cni:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-config-daemon:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-device-plugin:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-network-webhook:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-sriov-operator-must-gather:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8-operator:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-vertical-pod-autoscaler-rhel8:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ptp-must-gather-rhel8:v4.7.0-202102110027.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" }, { "category": "external", "summary": "CVE-2021-3121", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "bz#1921650: CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" } ], "release_date": "2021-01-11T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5635" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-capacity:v4.7.0-202102110027.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-nfd-operator:v4.7.0-202102111715.p0", "8Base-RHOSE-4.7:openshift4/ose-node-feature-discovery:v4.7.0-202102110027.p0" ] } ], "threats": [ { "category": "impact", "date": "2021-01-28T00:00:00Z", "details": "Important" } ], "title": "CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" } ] }
rhsa-2021_1369
Vulnerability from csaf_redhat
Published
2021-04-26 16:26
Modified
2024-09-18 04:28
Summary
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.6 security and bug fix updates
Notes
Topic
Red Hat Advanced Cluster Management for Kubernetes 2.1.6 General
Availability release images, which fix several bugs and security issues.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat Advanced Cluster Management for Kubernetes 2.1.6 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.1/html/release_notes/
Security fixes:
* golang.org/x/text: possibility to trigger an infinite loop in
encoding/unicode could lead to crash (CVE-2020-14040)
* mquery: Code injection via merge or clone operation (CVE-2020-35149)
For more details about the security issue, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug fixes:
* RHACM 2.1.6 images (BZ#1940581)
* When generating the import cluster string, it can include unescaped characters (BZ#1934184)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.1.6 General\nAvailability release images, which fix several bugs and security issues. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.1.6 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs and security issues. See\nthe following Release Notes documentation, which will be updated shortly \nfor this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.1/html/release_notes/\n\nSecurity fixes:\n\n* golang.org/x/text: possibility to trigger an infinite loop in\nencoding/unicode could lead to crash (CVE-2020-14040)\n\n* mquery: Code injection via merge or clone operation (CVE-2020-35149)\n\nFor more details about the security issue, including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nBug fixes:\n\n* RHACM 2.1.6 images (BZ#1940581)\n\n* When generating the import cluster string, it can include unescaped characters (BZ#1934184)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1369", "url": "https://access.redhat.com/errata/RHSA-2021:1369" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1929338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929338" }, { "category": "external", "summary": "1934184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934184" }, { "category": "external", "summary": "1940581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940581" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_1369.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.6 security and bug fix updates", "tracking": { "current_release_date": "2024-09-18T04:28:23+00:00", "generator": { "date": "2024-09-18T04:28:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:1369", "initial_release_date": "2021-04-26T16:26:19+00:00", "revision_history": [ { "date": "2021-04-26T16:26:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-26T16:26:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:28:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.1 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-RHACM-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.1::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.1.6-6" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.1 for RHEL 8", "product_id": "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64", "relates_to_product_reference": "8Base-RHACM-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.1/html/install/installing#upgrading-by-using-the-operator", "product_ids": [ "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1369" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-35149", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2021-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1929338" } ], "notes": [ { "category": "description", "text": "A flaw was found in mquery that allows a prototype pollution attack. This flaw allows an attacker to alter the code behavior by modifying the object prototype. A flaw in the lib/utils.js function allows cloning and merging objects without sanitizing their special properties, such as prototype defining \"__proto__\". The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "mquery: Code injection via merge or clone operation", "title": "Vulnerability summary" }, { "category": "other", "text": "The affected version of mquery is a dependency of the mongoose library. The exploitation of this vulnerability requires authenticated access, consequently, the CVSSv3 score for RHACM is lower than the score of the flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35149" }, { "category": "external", "summary": "RHBZ#1929338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35149", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35149" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-45q2-34rf-mr94", "url": "https://github.com/advisories/GHSA-45q2-34rf-mr94" }, { "category": "external", "summary": "https://portswigger.net/daily-swig/prototype-pollution-the-dangerous-and-underrated-vulnerability-impacting-javascript-applications", "url": "https://portswigger.net/daily-swig/prototype-pollution-the-dangerous-and-underrated-vulnerability-impacting-javascript-applications" } ], "release_date": "2020-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.1/html/install/installing#upgrading-by-using-the-operator", "product_ids": [ "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1369" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.1:rhacm2/acm-must-gather-rhel8@sha256:121f5cbddf3947ed9263759f072dc892af766d0cd24891156cff9e6f58821149_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mquery: Code injection via merge or clone operation" } ] }
rhsa-2020_5198
Vulnerability from csaf_redhat
Published
2020-11-24 09:02
Modified
2024-09-18 04:27
Summary
Red Hat Security Advisory: Red Hat OpenShift Jaeger security update
Notes
Topic
An update is now available for Red Hat OpenShift Jaeger 1.20.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Jaeger is Red Hat's distribution of the Jaeger project,
tailored for installation into an on-premise OpenShift Container Platform
installation.
Security Fix(es):
* golang-github-miekg-dns: predictable TXID can lead to response forgeries (CVE-2019-19794)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Jaeger 1.20.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Jaeger is Red Hat\u0027s distribution of the Jaeger project,\ntailored for installation into an on-premise OpenShift Container Platform\ninstallation.\n\nSecurity Fix(es):\n\n* golang-github-miekg-dns: predictable TXID can lead to response forgeries (CVE-2019-19794)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5198", "url": "https://access.redhat.com/errata/RHSA-2020:5198" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1786761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786761" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_5198.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Jaeger security update", "tracking": { "current_release_date": "2024-09-18T04:27:37+00:00", "generator": { "date": "2024-09-18T04:27:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:5198", "initial_release_date": "2020-11-24T09:02:25+00:00", "revision_history": [ { "date": "2020-11-24T09:02:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-24T09:02:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:27:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Jaeger 1.20", "product": { "name": "Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20", "product_identification_helper": { "cpe": "cpe:/a:redhat:jaeger:1.20::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Jaeger" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64", "product": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64", "product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.1-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64", "product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.1-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64", "product": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64", "product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.1-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64", "product": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64", "product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.1-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64", "product": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64", "product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.1-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64", "product": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64", "product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.1-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64", "product": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64", "product_id": "distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.1-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64", "product": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64", "product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.1-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64" }, "product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64" }, "product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64" }, "product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64" }, "product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64" }, "product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64" }, "product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19794", "cwe": { "id": "CWE-338", "name": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)" }, "discovery_date": "2019-12-27T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786761" } ], "notes": [ { "category": "description", "text": "The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-miekg-dns: predictable TXID can lead to response forgeries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19794" }, { "category": "external", "summary": "RHBZ#1786761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19794", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19794" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19794", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19794" } ], "release_date": "2019-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.6/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5198" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang-github-miekg-dns: predictable TXID can lead to response forgeries" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:368c464d25c0e7105fac06d868dbaf22aad0e5d0b131ede0158350b1097c2530_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:dee668b9269ffd46e3fb599f86161e5efa5e8a87cbad4586d30d5f9bf4d6882a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:41a9209a1c04be67045966edfef822d464ca75b96ac488a1e8557980f0ca0a1c_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.6/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5198" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:b865eafd2ca6f1973115f76d9dfcc95dc734115797208af0be6f08dcb9a5a9e3_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:dab400d79fd6b6b0bc328003756eb4434bb07ded74973ca09d584a4623e7498b_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:08a9fb69f64617ef399f3baa9f649fd0b33ba4f65afa15d36630825b1417d083_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8d006439b8629e2f3f790132aa2da22461ad373174252bf07293bad977010599_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:73d2a132ec00dc7db60081fc428b259c08731ec78fc9b2aa70eb8513739955da_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
rhsa-2020_3578
Vulnerability from csaf_redhat
Published
2020-09-08 10:09
Modified
2024-09-18 04:26
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.5.8 security update
Notes
Topic
An update for cluster-network-operator-container, cluster-version-operator-container, elasticsearch-operator-container, logging-kibana6-container, and ose-cluster-svcat-controller-manager-operator-container is now available for Red Hat OpenShift Container Platform 4.5.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Container Platform components are primarily written in Go (golang).
The golang.org/x/text contains text-related packages which are used for text operations, such as character encodings, text transformations, and locale-specific text handling.
Kibana is one of the major components of OpenShift Container Platform cluster logging.
It is a browser-based console interface to query, discover, and visualize the log data.
Security Fix(es):
* kibana: XSS in TSVB visualization (ESA-2020-08) (CVE-2020-7015)
* golang.org/x/text: Possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cluster-network-operator-container, cluster-version-operator-container, elasticsearch-operator-container, logging-kibana6-container, and ose-cluster-svcat-controller-manager-operator-container is now available for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Container Platform components are primarily written in Go (golang).\nThe golang.org/x/text contains text-related packages which are used for text operations, such as character encodings, text transformations, and locale-specific text handling.\n\nKibana is one of the major components of OpenShift Container Platform cluster logging.\nIt is a browser-based console interface to query, discover, and visualize the log data.\n\nSecurity Fix(es):\n\n* kibana: XSS in TSVB visualization (ESA-2020-08) (CVE-2020-7015)\n\n* golang.org/x/text: Possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3578", "url": "https://access.redhat.com/errata/RHSA-2020:3578" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1849037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849037" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2020/rhsa-2020_3578.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.8 security update", "tracking": { "current_release_date": "2024-09-18T04:26:37+00:00", "generator": { "date": "2024-09-18T04:26:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2020:3578", "initial_release_date": "2020-09-08T10:09:31+00:00", "revision_history": [ { "date": "2020-09-08T10:09:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-09-08T10:09:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:26:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "product_id": "openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202008210149.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "product_id": "openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202008280601.p0" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "product_id": "openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.5.0-202008310950.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "product": { "name": "openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "product_id": "openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-kibana6\u0026tag=v4.5.0-202008310950.p0" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "product_id": "openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202008210149.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x", "product_id": "openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202008280601.p0" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "product_id": "openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.5.0-202008310950.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x", "product": { "name": "openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x", "product_id": "openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-kibana6\u0026tag=v4.5.0-202008310950.p0" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "product_id": "openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202008210149.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "product_id": "openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202008280601.p0" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "product_id": "openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.5.0-202008310950.p0" } } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "product": { "name": "openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "product_id": "openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-kibana6\u0026tag=v4.5.0-202008310950.p0" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64" }, "product_reference": "openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le" }, "product_reference": "openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x" }, "product_reference": "openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7015", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-06-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1849037" } ], "notes": [ { "category": "description", "text": "Kibana versions before 6.8.9 and 7.7.0 contains a stored XSS flaw in the TSVB visualization. An attacker who is able to edit or create a TSVB visualization could allow the attacker to obtain sensitive information from, or perform destructive actions, on behalf of Kibana users who edit the TSVB visualization.", "title": "Vulnerability description" }, { "category": "summary", "text": "kibana: XSS in TSVB visualization (ESA-2020-08)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7015" }, { "category": "external", "summary": "RHBZ#1849037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849037" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7015", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7015" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7015", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7015" }, { "category": "external", "summary": "https://discuss.elastic.co/t/elastic-stack-7-7-1-and-6-8-10-security-update/235573", "url": "https://discuss.elastic.co/t/elastic-stack-7-7-1-and-6-8-10-security-update/235573" } ], "release_date": "2020-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3578" }, { "category": "workaround", "details": "To mitigate this vulnerability you can set \"metrics.enabled: false\" in kibana.yml", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kibana: XSS in TSVB visualization (ESA-2020-08)" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7299422adec799d34c931a3e61fa7c64b830d0b63ca8071a2080ce408e74e271_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:7bb27b815f70cbc4e39741425e643bdb7bd0781bc3fec98eee1be78e5765804e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-elasticsearch-operator@sha256:b6199dad19e9c05af81d4652d3927c263ec1e8853726632b703dbc9ee4cddfa4_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:0fd0bdf8433265a5da7b3d9f61cb5896d649c3e2966c77f79f02023ef0a43d20_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:651ec08a2be0652c9d7b709931876c2910a3c0b1881bdf75317fcaaa34af11e4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-logging-kibana6@sha256:e22e477267031f697463351872ba50f86dce172d600fb208f91c44e1e136e397_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:084fd8364f530a54b7f8beba9d562a7f0bd8fed2dfe34f1d4cb35b1f32b6b30c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:132c0a4112e13fae6abed900fd1d7c14d21b443bb39c21c67fa0223d323dc3f5_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:9ec5a9ae1f08f0bc6fa1eb4516b5f64e7e89f3ef49589854f68ecc362b6c8cac_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:2692648061909c425f2133e958002a0ab8e2d2a89c5272e8c516651a4ae4e955_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:d852f36c75d997fb5ed8f4f6c1f7eeaaad492c62fd39dd33af73e00194fedf45_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:ff5be8762429be98d424da42033a3cdc941ba969e0a6a9ec1027666c33538cfa_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" } ] }
gsd-2020-14040
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-14040", "description": "The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.", "id": "GSD-2020-14040", "references": [ "https://www.suse.com/security/cve/CVE-2020-14040.html", "https://access.redhat.com/errata/RHSA-2021:3140", "https://access.redhat.com/errata/RHSA-2021:2039", "https://access.redhat.com/errata/RHSA-2021:1369", "https://access.redhat.com/errata/RHSA-2021:1168", "https://access.redhat.com/errata/RHSA-2021:1129", "https://access.redhat.com/errata/RHSA-2021:0980", "https://access.redhat.com/errata/RHSA-2021:0799", "https://access.redhat.com/errata/RHSA-2021:0420", "https://access.redhat.com/errata/RHSA-2020:5635", "https://access.redhat.com/errata/RHSA-2020:5633", "https://access.redhat.com/errata/RHSA-2020:5606", "https://access.redhat.com/errata/RHSA-2020:5605", "https://access.redhat.com/errata/RHSA-2020:5198", "https://access.redhat.com/errata/RHSA-2020:5149", "https://access.redhat.com/errata/RHSA-2020:5056", "https://access.redhat.com/errata/RHSA-2020:5055", "https://access.redhat.com/errata/RHSA-2020:5054", "https://access.redhat.com/errata/RHSA-2020:4694", "https://access.redhat.com/errata/RHSA-2020:4298", "https://access.redhat.com/errata/RHSA-2020:4297", "https://access.redhat.com/errata/RHSA-2020:4214", "https://access.redhat.com/errata/RHSA-2020:3783", "https://access.redhat.com/errata/RHSA-2020:3780", "https://access.redhat.com/errata/RHSA-2020:3727", "https://access.redhat.com/errata/RHSA-2020:3665", "https://access.redhat.com/errata/RHSA-2020:3578", "https://access.redhat.com/errata/RHSA-2020:3372", "https://access.redhat.com/errata/RHSA-2020:3369", "https://access.redhat.com/errata/RHSA-2020:3087", "https://alas.aws.amazon.com/cve/html/CVE-2020-14040.html", "https://linux.oracle.com/cve/CVE-2020-14040.html", "https://ubuntu.com/security/CVE-2020-14040" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-14040" ], "details": "The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.", "id": "GSD-2020-14040", "modified": "2023-12-13T01:21:59.890740Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-14040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" }, { "name": "FEDORA-2020-a55f130272", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003cv0.3.3", "affected_versions": "All versions before 0.3.3", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-835", "CWE-937" ], "date": "2020-11-18", "description": "The `x/text` package for Go has a vulnerability in `encoding/unicode` that could lead to the `UTF-16` decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a `UTF16` decoder instantiated with `UseBOM` or `ExpectBOM` to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to `golang.org/x/text/transform.String`.", "fixed_versions": [ "v0.3.3" ], "identifier": "CVE-2020-14040", "identifiers": [ "CVE-2020-14040" ], "not_impacted": "All versions starting from 0.3.3", "package_slug": "go/golang.org/x/text", "pubdate": "2020-06-17", "solution": "Upgrade to version 0.3.3 or above.", "title": "Loop with Unreachable Exit Condition (Infinite Loop)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" ], "uuid": "8ab0265a-d1a9-4085-a661-0d9d9931f0ad" }, { "affected_range": "\u003c0.3.3", "affected_versions": "All versions before 0.3.3", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-707", "CWE-835", "CWE-937" ], "date": "2021-05-18", "description": "The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.", "fixed_versions": [ "0.3.3" ], "identifier": "CVE-2020-14040", "identifiers": [ "GHSA-5rcv-m4m3-hfh7", "CVE-2020-14040" ], "not_impacted": "All versions starting from 0.3.3", "package_slug": "go/golang.org/x/text/encoding/unicode", "pubdate": "2021-05-18", "solution": "Upgrade to version 0.3.3 or above.", "title": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "https://github.com/golang/go/issues/39491", "https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e", "https://github.com/advisories/GHSA-5rcv-m4m3-hfh7" ], "uuid": "c90a0e0c-5518-452d-9d0d-2b4fda034e75" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.3.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-14040" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-835" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" }, { "name": "FEDORA-2020-a55f130272", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2020-11-18T14:44Z", "publishedDate": "2020-06-17T20:15Z" } } }
wid-sec-w-2023-2981
Vulnerability from csaf_certbund
Published
2020-08-06 22:00
Modified
2023-11-21 23:00
Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen oder weitere nicht definierte Auswirkungen zu erzielen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen oder weitere nicht definierte Auswirkungen zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2981 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2023-2981.json" }, { "category": "self", "summary": "WID-SEC-2023-2981 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2981" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21", "url": "https://linux.oracle.com/errata/ELSA-2023-6939.html" }, { "category": "external", "summary": "RedHat Security Advisory vom 2020-08-06", "url": "https://access.redhat.com/errata/RHSA-2020:3369" }, { "category": "external", "summary": "RedHat Security Advisory vom 2020-08-06", "url": "https://access.redhat.com/errata/RHSA-2020:3372" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3578 vom 2020-09-08", "url": "https://access.redhat.com/errata/RHSA-2020:3578" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:1129 vom 2021-04-08", "url": "https://access.redhat.com/errata/RHSA-2021:1129" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:1168 vom 2021-04-13", "url": "https://access.redhat.com/errata/RHSA-2021:1168" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3727 vom 2020-09-16", "url": "https://access.redhat.com/errata/RHSA-2020:3727" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3780 vom 2020-09-21", "url": "https://access.redhat.com/errata/RHSA-2020:3780" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3783 vom 2020-09-22", "url": "https://access.redhat.com/errata/RHSA-2020:3783" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4297 vom 2020-10-27", "url": "https://access.redhat.com/errata/RHSA-2020:4297" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:2039 vom 2021-05-19", "url": "https://access.redhat.com/errata/RHSA-2021:2039" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4694 vom 2020-11-04", "url": "https://access.redhat.com/errata/RHSA-2020:4694" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5054 vom 2020-11-10", "url": "https://access.redhat.com/errata/RHSA-2020:5054" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5055 vom 2020-11-10", "url": "https://access.redhat.com/errata/RHSA-2020:5055" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5149 vom 2020-11-18", "url": "https://access.redhat.com/errata/RHSA-2020:5149" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5198 vom 2020-11-24", "url": "https://access.redhat.com/errata/RHSA-2020:5198" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5606 vom 2020-12-17", "url": "https://access.redhat.com/errata/RHSA-2020:5606" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5611 vom 2020-12-17", "url": "https://access.redhat.com/errata/RHSA-2020:5611" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:1369 vom 2021-04-26", "url": "https://access.redhat.com/errata/RHSA-2021:1369" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0799 vom 2021-03-10", "url": "https://access.redhat.com/errata/RHSA-2021:0799" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3140 vom 2021-08-11", "url": "https://access.redhat.com/errata/RHSA-2021:3140" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3259 vom 2021-08-25", "url": "https://access.redhat.com/errata/RHSA-2021:3259" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-21T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:52:09.158+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2981", "initial_release_date": "2020-08-06T22:00:00.000+00:00", "revision_history": [ { "date": "2020-08-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-09-07T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-15T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-21T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-10-27T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-03T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-10T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-18T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-23T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-24T23:00:00.000+00:00", "number": "10", "summary": "Referenz(en) aufgenommen: RHSA-2020:5179" }, { "date": "2020-12-16T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-12-23T23:00:00.000+00:00", "number": "12", "summary": "Referenz(en) aufgenommen: FEDORA-2020-66E6E8D027" }, { "date": "2021-03-09T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-04-08T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-04-12T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-04-26T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-05-18T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-11T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-24T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "20" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift service mesh 1.1", "product": { "name": "Red Hat OpenShift service mesh 1.1", "product_id": "T016838", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh_1.1" } } }, { "category": "product_name", "name": "Red Hat OpenShift service mesh 1.0", "product": { "name": "Red Hat OpenShift service mesh 1.0", "product_id": "T017057", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:service_mesh_1.0" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12666", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat OpenShift. Die \"macaron\" Komponente hat einen \"Open Redirect\" Fehler im statischen Handler. Ein Angreifer kann diese Schwachstelle ausnutzen, um das Opfer unbemerkt auf eine nicht vertrauensw\u00fcrdige Seite umzuleiten. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen eine modifizierte URL oder Webseite in seinem Webbrowser zu \u00f6ffnen." } ], "product_status": { "known_affected": [ "T017057", "T016838", "67646", "T004914" ] }, "release_date": "2020-08-06T22:00:00Z", "title": "CVE-2020-12666" }, { "cve": "CVE-2020-14040", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat OpenShift. In der Bibliothek golang.org/x/text besteht in einigen Funktionen, z. B. unicode.Transform, transform.String oder transform.Byte, ein Problem mit einer Endlosschleife. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er einer entsprechenden Anwendung bestimmte Zeichen oder Zeichenfolgen bereitstellt, und dadurch einen Denial of Service verursachen." } ], "product_status": { "known_affected": [ "T017057", "T016838", "67646", "T004914" ] }, "release_date": "2020-08-06T22:00:00Z", "title": "CVE-2020-14040" }, { "cve": "CVE-2020-8203", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat OpenShift. Hierbei handelt es sich um einen Prototype pollution Schwachstelle bei der Benutzung von _.zipObjectDeep in lodash. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service oder weitere nicht definierte Auswirkungen zu erzielen." } ], "product_status": { "known_affected": [ "T017057", "T016838", "67646", "T004914" ] }, "release_date": "2020-08-06T22:00:00Z", "title": "CVE-2020-8203" } ] }
ghsa-5rcv-m4m3-hfh7
Vulnerability from github
Published
2021-05-18 18:34
Modified
2024-05-20 19:24
Severity
Summary
golang.org/x/text Infinite loop
Details
Go version v0.3.3 of the x/text package fixes a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.
Specific Go Packages Affected
golang.org/x/text/encoding/unicode golang.org/x/text/transform
{ "affected": [ { "package": { "ecosystem": "Go", "name": "golang.org/x/text" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.3.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-14040" ], "database_specific": { "cwe_ids": [ "CWE-400", "CWE-835" ], "github_reviewed": true, "github_reviewed_at": "2021-05-12T14:54:58Z", "nvd_published_at": null, "severity": "MODERATE" }, "details": "Go version v0.3.3 of the x/text package fixes a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.\n\n### Specific Go Packages Affected\ngolang.org/x/text/encoding/unicode\ngolang.org/x/text/transform", "id": "GHSA-5rcv-m4m3-hfh7", "modified": "2024-05-20T19:24:15Z", "published": "2021-05-18T18:34:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "type": "WEB", "url": "https://github.com/golang/go/issues/39491" }, { "type": "WEB", "url": "https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "WEB", "url": "https://go-review.googlesource.com/c/text/+/238238" }, { "type": "WEB", "url": "https://go.dev/cl/238238" }, { "type": "WEB", "url": "https://go.dev/issue/39491" }, { "type": "WEB", "url": "https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e" }, { "type": "WEB", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "type": "CVSS_V3" } ], "summary": "golang.org/x/text Infinite loop" }
Loading...