Action not permitted
Modal body text goes here.
cve-2020-15586
Vulnerability from cvelistv5
Published
2020-07-17 15:38
Modified
2024-08-04 13:22
Severity ?
EPSS score ?
Summary
Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:22:29.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2020:1087", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" }, { "name": "openSUSE-SU-2020:1095", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" }, { "name": "FEDORA-2020-d75360e2b0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW/" }, { "name": "FEDORA-2020-9cd1204ba0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/" }, { "name": "openSUSE-SU-2020:1405", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" }, { "name": "openSUSE-SU-2020:1407", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html" }, { "name": "DSA-4848", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4848" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/golang-announce/XZNfaiwgt2w" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0005/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/golang-announce/f2c5bqrGH_g" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cloudfoundry.org/blog/cve-2020-15586/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-14T17:20:17", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "openSUSE-SU-2020:1087", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" }, { "name": "openSUSE-SU-2020:1095", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" }, { "name": "FEDORA-2020-d75360e2b0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW/" }, { "name": "FEDORA-2020-9cd1204ba0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/" }, { "name": "openSUSE-SU-2020:1405", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" }, { "name": "openSUSE-SU-2020:1407", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html" }, { "name": "DSA-4848", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4848" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21topic/golang-announce/XZNfaiwgt2w" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0005/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/forum/#%21topic/golang-announce/f2c5bqrGH_g" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cloudfoundry.org/blog/cve-2020-15586/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15586", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2020:1087", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" }, { "name": "openSUSE-SU-2020:1095", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" }, { "name": "FEDORA-2020-d75360e2b0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW/" }, { "name": "FEDORA-2020-9cd1204ba0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/" }, { "name": "openSUSE-SU-2020:1405", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" }, { "name": "openSUSE-SU-2020:1407", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html" }, { "name": "DSA-4848", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4848" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w" }, { "name": "https://security.netapp.com/advisory/ntap-20200731-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200731-0005/" }, { "name": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g" }, { "name": "https://www.cloudfoundry.org/blog/cve-2020-15586/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/blog/cve-2020-15586/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-15586", "datePublished": "2020-07-17T15:38:24", "dateReserved": "2020-07-07T00:00:00", "dateUpdated": "2024-08-04T13:22:29.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-15586\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-07-17T16:15:11.480\",\"lastModified\":\"2023-11-07T03:17:41.413\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.\"},{\"lang\":\"es\",\"value\":\"Go versiones anteriores a 1.13.13 y versiones 1.14.x anteriores a 1.14.5, presenta una carrera de datos en algunos servidores net/http, como es demostrado por el Manejador httputil.ReverseProxy, porque lee un cuerpo de petici\u00f3n y escribe una respuesta al mismo tiempo\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.13.13\",\"matchCriteriaId\":\"CF900B29-8A1F-4517-A24F-1E154DBEB3FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.14.0\",\"versionEndExcluding\":\"1.14.5\",\"matchCriteriaId\":\"2B1FE085-DCB4-4BCC-86A7-A6DA83AA8ABC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.7.0\",\"matchCriteriaId\":\"8DA59AA0-F83D-44F1-BEEB-9E5D2CF70D2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudfoundry:routing-release:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.203.0\",\"matchCriteriaId\":\"2F7677BE-5DFB-48EB-8FCB-AC6A0D983F5E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21topic/golang-announce/XZNfaiwgt2w\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://groups.google.com/forum/#%21topic/golang-announce/f2c5bqrGH_g\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20200731-0005/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cloudfoundry.org/blog/cve-2020-15586/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4848\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2020_5118
Vulnerability from csaf_redhat
Published
2020-11-24 12:41
Modified
2024-11-13 22:17
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.
This release includes a security update for golang for Red Hat OpenShift Container Platform 4.5.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
This advisory contains the container images for Red Hat OpenShift Container
Platform 4.5.20. See the following advisory for the RPM packages for this
release:
https://access.redhat.com/errata/RHSA-2020:5119
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html
This update fixes the following bug among others:
* Previously, the Prometheus swagger definition contained a `$ref` property which could not be resolved. This caused a runtime error to occur when using the Prometheus operand creation form. This was fixed by adding a `definitions` property to schema returned by the `definitionFor` helper function so that the `$ref` property can resolve. There are no longer runtime errors when using the Prometheus operand creation form. (BZ#1885228)
You may download the oc tool and use it to inspect release image metadata
as follows:
(For x86_64 architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.5.20-x86_64
The image digest is sha256:78b878986d2d0af6037d637aa63e7b6f80fc8f17d0f0d5b077ac6aca83f792a0
(For s390x architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.5.20-s390x
The image digest is sha256:372d9aea634d36704d8500a2f940edb3867bfde14c0e5aa19534ea5ac90083d4
(For ppc64le architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.5.20-ppc64le
The image digest is sha256:030d8323cce90de6bc7ad4119ebb7f000bde06e742f6923faf76707ffe85634a
All OpenShift Container Platform 4.5 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for golang for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.5.20. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2020:5119\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nThis update fixes the following bug among others:\n\n* Previously, the Prometheus swagger definition contained a `$ref` property which could not be resolved. This caused a runtime error to occur when using the Prometheus operand creation form. This was fixed by adding a `definitions` property to schema returned by the `definitionFor` helper function so that the `$ref` property can resolve. There are no longer runtime errors when using the Prometheus operand creation form. (BZ#1885228)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-x86_64\n\nThe image digest is sha256:78b878986d2d0af6037d637aa63e7b6f80fc8f17d0f0d5b077ac6aca83f792a0\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-s390x\n\nThe image digest is sha256:372d9aea634d36704d8500a2f940edb3867bfde14c0e5aa19534ea5ac90083d4\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.5.20-ppc64le\n\nThe image digest is sha256:030d8323cce90de6bc7ad4119ebb7f000bde06e742f6923faf76707ffe85634a\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5118", "url": "https://access.redhat.com/errata/RHSA-2020:5118" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1883268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883268" }, { "category": "external", "summary": "1885228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885228" }, { "category": "external", "summary": "1892585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892585" }, { "category": "external", "summary": "1893202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893202" }, { "category": "external", "summary": "1893742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893742" }, { "category": "external", "summary": "1894763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894763" }, { "category": "external", "summary": "1894782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894782" }, { "category": "external", "summary": "1895057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895057" }, { "category": "external", "summary": "1896990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896990" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5118.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update", "tracking": { "current_release_date": "2024-11-13T22:17:20+00:00", "generator": { "date": "2024-11-13T22:17:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2020:5118", "initial_release_date": "2020-11-24T12:41:33+00:00", "revision_history": [ { "date": "2020-11-24T12:41:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-24T12:41:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:17:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "product_id": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "product_id": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "product_id": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "product": { "name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "product_id": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "product": { "name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "product_id": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "product": { "name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "product_id": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "product": { "name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "product_id": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "product": { "name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "product_id": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "product": { "name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "product_id": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.5.0-202011070210.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "product": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.5.0-202011070210.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "product": { "name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "product_id": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "product_id": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le", "product": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le", "product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "product": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "product": { "name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "product_id": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "product": { "name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "product_id": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "product": { "name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "product_id": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "product": { "name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "product_id": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "product": { "name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "product_id": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "product": { "name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "product_id": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "product": { "name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "product_id": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "product": { "name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "product_id": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "product": { "name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "product_id": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "product": { "name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "product_id": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "product": { "name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "product_id": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.5.0-202011121956.p0" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "product": { "name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "product_id": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "product": { "name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "product_id": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "product": { "name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "product_id": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "product": { "name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "product_id": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "product": { "name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "product_id": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "product": { "name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "product_id": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "product_id": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "product_id": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "product_id": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "product_id": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "product_id": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "product_id": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "product_id": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "product": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "product": { "name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "product_id": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "product": { "name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "product_id": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "product": { "name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "product_id": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "product": { "name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "product_id": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "product": { "name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "product_id": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "product": { "name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "product_id": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "product_id": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "product": { "name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "product_id": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "product_id": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "product": { "name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "product_id": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "product": { "name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "product_id": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "product_id": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "product": { "name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "product_id": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "product_id": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "product_id": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "product_id": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "product": { "name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "product_id": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "product": { "name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "product_id": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "product_id": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "product": { "name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "product_id": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "product": { "name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "product_id": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "product": { "name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "product_id": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.5.0-202011070210.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "product": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.5.0-202011070210.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "product": { "name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "product_id": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "product_id": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "product": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "product": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "product": { "name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "product_id": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "product_id": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "product": { "name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "product_id": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "product": { "name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "product_id": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "product": { "name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "product_id": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "product": { "name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "product_id": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "product": { "name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "product_id": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "product": { "name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "product_id": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "product": { "name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "product_id": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "product": { "name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "product_id": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "product": { "name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "product_id": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.5.0-202011121956.p0" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "product": { "name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "product_id": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "product": { "name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "product_id": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "product": { "name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "product_id": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "product": { "name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "product_id": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "product_id": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "product": { "name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "product_id": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "product": { "name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "product_id": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "product_id": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "product_id": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "product_id": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "product_id": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "product_id": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "product_id": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "product_id": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "product_id": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "product": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "product": { "name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "product_id": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "product": { "name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "product_id": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "product_id": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "product": { "name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "product_id": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "product": { "name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "product_id": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "product_id": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "product_id": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "product": { "name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "product_id": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "product": { "name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "product_id": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "product": { "name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "product_id": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "product_id": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "product": { "name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "product_id": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "product_id": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "product_id": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "product_id": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "product": { "name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "product_id": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "product": { "name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "product_id": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "product": { "name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "product_id": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "product": { "name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "product_id": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "product": { "name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "product_id": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "product": { "name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "product_id": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "product_id": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "product": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "product": { "name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "product_id": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "product": { "name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "product_id": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "product": { "name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "product_id": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel7\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "product": { "name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "product_id": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "product": { "name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "product_id": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "product": { "name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "product_id": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "product": { "name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "product_id": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "product": { "name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "product_id": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.5.0-202011151045.p0" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "product": { "name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "product_id": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.5.0-202011151045.p0" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "product": { "name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "product_id": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "product": { "name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "product_id": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "product": { "name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "product_id": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "product": { "name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "product_id": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "product": { "name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "product_id": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "product": { "name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "product_id": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "product": { "name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "product_id": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "product_id": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "product_id": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "product_id": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "product_id": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "product_id": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "product_id": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "product_id": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "product": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "product": { "name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "product_id": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.5.0-202011121956.p0" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "product_id": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel7\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "product": { "name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "product_id": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.5.0-202011121956.p0" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "product": { "name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "product_id": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "product": { "name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "product_id": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "product": { "name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "product_id": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "product": { "name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "product_id": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "product_id": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "product": { "name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "product_id": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "product_id": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "product": { "name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "product_id": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.5.0-202011142223.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "product": { "name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "product_id": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "product_id": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.5.0-202011132127.p0" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "product": { "name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "product_id": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.5.0-202011132127.p0" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64" }, "product_reference": "openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64" }, "product_reference": "openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x" }, "product_reference": "openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le" }, "product_reference": "openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64" }, "product_reference": "openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le" }, "product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x" }, "product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64" }, "product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64" }, "product_reference": "openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le" }, "product_reference": "openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x" }, "product_reference": "openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x" }, "product_reference": "openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64" }, "product_reference": "openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le" }, "product_reference": "openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64" }, "product_reference": "openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x" }, "product_reference": "openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le" }, "product_reference": "openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le" }, "product_reference": "openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x" }, "product_reference": "openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64" }, "product_reference": "openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64" }, "product_reference": "openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x" }, "product_reference": "openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le" }, "product_reference": "openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x" }, "product_reference": "openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le" }, "product_reference": "openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64" }, "product_reference": "openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le" }, "product_reference": "openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64" }, "product_reference": "openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x" }, "product_reference": "openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x" }, "product_reference": "openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64" }, "product_reference": "openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le" }, "product_reference": "openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le" }, "product_reference": "openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x" }, "product_reference": "openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64" }, "product_reference": "openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le" }, "product_reference": "openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64" }, "product_reference": "openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x" }, "product_reference": "openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x" }, "product_reference": "openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64" }, "product_reference": "openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le" }, "product_reference": "openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le" }, "product_reference": "openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x" }, "product_reference": "openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64" }, "product_reference": "openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x" }, "product_reference": "openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64" }, "product_reference": "openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le" }, "product_reference": "openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le" }, "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64" }, "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64" }, "product_reference": "openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x" }, "product_reference": "openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le" }, "product_reference": "openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64" }, "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le" }, "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x" }, "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x" }, "product_reference": "openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le" }, "product_reference": "openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64" }, "product_reference": "openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le" }, "product_reference": "openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x" }, "product_reference": "openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x" }, "product_reference": "openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64" }, "product_reference": "openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le" }, "product_reference": "openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x" }, "product_reference": "openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le" }, "product_reference": "openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le" }, "product_reference": "openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x" }, "product_reference": "openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64" }, "product_reference": "openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64" }, "product_reference": "openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x" }, "product_reference": "openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le" }, "product_reference": "openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le" }, "product_reference": "openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64" }, "product_reference": "openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x" }, "product_reference": "openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le" }, "product_reference": "openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x" }, "product_reference": "openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64" }, "product_reference": "openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64" }, "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le" }, "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le" }, "product_reference": "openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64" }, "product_reference": "openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-24T12:41:33+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5118" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-24T12:41:33+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5118" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:openshift4/ose-aws-machine-controllers@sha256:70e7565f6c926899ff202066615fc98009c2fe46eab3bb9b62bf6b9d2247469f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-azure-machine-controllers@sha256:c7f1fcfdfc0428c72c4dfe3c9fec52d0cff78578d5445dbc893090ba4d6b7a4d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:45f0f930a16af82554639f85e617612bc5a981aa1392aa85fc4e432995e96a2d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:6e585ebd28414a11a6de580b7923b2e26fc1a2fd0b8c6c21aa5acaefe85bad62_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-baremetal-machine-controllers@sha256:7eade72bf02518a8786a804fd9159f61046cd8defc4c06fde563d067b2091a9a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:4c035f73a8f041baef9fbbaeb964598287889fecffbe24d1dc8c83a3741dba87_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:64b4dc8cbb2c7c073fc8f25d01800821dfbb42a2f71a49395bf4061381168d6a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli-artifacts@sha256:eaad76ece8b6fc7e0550712101cedddf7e0b999cdb15caebc6fd708a191e0d57_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:4c1d07326e9d4fdb0cda26fbcd39e13df0295f926e1d60d16a891d06feb60b51_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:ba81819c018b6f0a01d5825ed7e56497863feadc91990e3cb76c3c2a391a6912_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cli@sha256:cc4eaab57638fe0b20e449dcc94ae5325dfd9cb69dc631b28420be85deb32e60_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:6c2505c6e8b379499ddfbcc847a1d55e0dcad20513fa6f991f57d9ad40d19304_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:80f263ca5c81a9ee6387f967e60df112423d1f0373d98300631b7c4a45b47151_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cloud-credential-operator@sha256:9aff7d6651d6b99350ed3d25508e7e3377a08718cb413a8fe752ba3096c94f71_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:81eb4542ef7d282f17a0f9a558650cd0acaf53ab7291f469f179fabea224ceaf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:ee77a15cad91b91bffe4c92a94e3ad642df156be9fe3ddacf3e7ed7f2a8558ee_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-authentication-operator@sha256:f6bdc07e1875e8a4c4014380e1089f205fe890aaed81b89b1be4e7176dd22541_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:2359c08e7cef3f6d3204f18ebe1672f0a7a68e0e6604cbcb9f7f8b323b6c223a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:8381260980527597034736e03b3eb3a41f431477f0fab3f74e6852b8fe2f68e6_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler-operator@sha256:9e11b99dd223402991658413925dc4274d817369497ce775237f182dea8ba17a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:166e3f67bfd0ecb682215cbef8febd3f7c429f7e367427a3b258f1539b73fe67_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:e5e25f47b1caa1a5723764d01bc2d2e3a4db83a790482ed07c4f263c45844f19_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-autoscaler@sha256:ff411e9c4054c0a247c9b61192852129e5eefdf75247e7f7852c9bd6f234b082_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:79f44f30243d2d110e0a20d3fc619b829e174903e0fae8975e99454200a4a350_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:e4dff5136a158962da00456d74a6492a2b8ff636b1706b8cc87c8d4f905007f0_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-bootstrap@sha256:f657bf68fdc83d1842f651a1f2ab4e8d8840ae8a349880e49c95eb0f3e79546c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:572db806b6a37593d8ea3761a0f484fabce083efe661c31a7e2a7837b162e1ca_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:5d2094ad00cab387f5d89d4b586289973c6c1ea478a0d3d39e0ab0586eb3827f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-config-operator@sha256:a19d762acae28d9106156e733a17b60ce58135ef77846c5f1112098b93ef1ed0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:99c729dd674168ab615555202ccb5cf894f7710c676e2e56c0c6853e981fb8e9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:c7615abf2a683e57969b814f9f1b3b1bc491fc99e6b7ae1107a9291b6aa319a8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-dns-operator@sha256:e80139fdd21c28e2f02a107d80d49862b19bb41cc15b94a3c73ba4355f3680dc_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:3da6b699f895b1e2c0dc93590d200ceef9e592e845d5eb39d490cb134303ec1e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:4311c29890001da223c8ae7be77d4e5d6de095c67cd181497dc409b6628d63c6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-image-registry-operator@sha256:7462dea26db7d5bafd7b14d0fa78edb746809634f8f412bb4c88d5ab4dddf4fe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:0717e349157c9738231f3afc351037544737c80ee3a9827fb5fa1d027050abec_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:2146aaffe4409cec1f776515b941b33fbc22d63f6ba5e0b6a2de248f02df5609_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-ingress-operator@sha256:5114c48f9f98257a73971103c9b8cf95aa979b13fc501de258d10f076b53365d_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:1fbf8a39c776645f87cd1c957c2784a87f55d3e37f038453e94135379f55b8f2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:d25848569302686d4877c3b777dac62fecef93f5bf1692c2872a9d49501d0557_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-apiserver-operator@sha256:de25c1241e413a1b76d80d6bf16dd07221aea5870d6112f8df945fbdafd4abed_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9f1d68d15e9226fa2a55ba2949eacc9097d41077d45a829c6c81e13b64a45d81_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:a4c92b14a5a40155a1a1332a5ff03326251385f7a6834228741da591874896da_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-controller-manager-operator@sha256:c09c8f807a98bbcb7a8c5536b06344a255dc5a7e1e98581e2da78b6509d4b24c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:071b76079b14148207e307306ce621f00ac16c6f5d8a6bbd2ea846e2d5277d44_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:8a761656609fc2c6062cb36317588f648694b4619affc872258fbb59e71df1aa_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-kube-scheduler-operator@sha256:d8144fb2cd0939a90aded0c35959933793eee21679f647a1eef5ce54164cc2a4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:7ecc99652ba47e610da68ed98ea7951ba2c54373d640bc335c0824a9c895315b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:91b93dfd6698ebe8158aecfd3a9be649bdc6e234a6591ecfbd69e5d067a6d555_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-machine-approver@sha256:e734979e9b1084a1a9a62209c3b1447db549ba6713f998edeb1f35ecb076c7bd_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:5f5073a7f4977991f873b967c8291faea6e4063b74f5899b6610f020ff7cba8f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:cd46ea6d1c4a55a61c2b75426eb3d0b963074179c96b0bac80ee47e298df6235_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-monitoring-operator@sha256:eccb45abd3b1bd2cb28e62d0aef22f11c5c6f11f1667c39f6f4637a6f4be9521_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:87f80b026312e41dda2f96b5a39b376b91627ddb0aa4b87f7eed7fd25c9d2366_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:cd8db357fea4b1cef6d8ad77ce621ae84f6ff9ce337591bfee9151fbc63bb514_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-network-operator@sha256:f7ca509d3d87099242a5f3a4961fc6bbb9334dbc646180a1dbe1edafb9e0577e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:05b09c25720e657c592fa1ee141bd2cf9ede8c4fd04905e97967e5d73e234ae9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:1817c8530500a8dbcec935791b0210a5ed3005d3d0b256ddb68e4b6fe74a8371_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-node-tuning-operator@sha256:27a8ca3c5475f341f7f0ec8ee410a12f189466d4b3c49a4f5002f3d2143b0bdb_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:3d9ef7f4e7283886586b5803b7e2b3f6350e9af660a4b970e5fb7cef02ca4a8c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:70ea3afc7e2a06bd28b613ce088247ef6f79a93aea5d87009bab43304b4b0777_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-apiserver-operator@sha256:810845a0656aa213e418153e8db76dcdb5dc8154df98aa81ce7270afd92cfdb7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:216619014c59ec66dd72339bfc767eb4520106cdcde1067ad909f4ff93e143eb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:40500d979e1840e917fe1a9e991d41546ab7d089fd77548aec0693330a9b6f02_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:df3d7ccdd65b636ba03ef6b1884cbf43358cfd82fd6661276d64ae7e7eb7e3f0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:179b083ea94efda42bcb7e21dcfa8606e9b2c7a9f84a177c615941498d42b65e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:25dd4b5f6a506b79178b41f7a23f99b67bd1c2aa1ae9a4476b578915951fa9f1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-samples-operator@sha256:cb6e26911fba80f58645af6142c5a1848680e2b932c5bf2789fa07f9c4be604a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:5216485b6afdab88716277832f79e76f0ee780257d58a5c9c53263a1eca0a070_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:6a56e6d88cb5ae67efa5488911910118d09add56d8d9047ea8e713e7d7687888_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-storage-operator@sha256:7fcbee809b3709fb4ce902638cd33dc37a9c7f1b2da9819c0d917b9c27f31695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:c7d1d4b7425c146667ef8a2c9a40491e551bdc243f88ce08e1fbb90d1e58736e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:d25f6871ef937af150970c1e446de039afa99a4fb878a9fa85572c1b3173e8f9_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-svcat-apiserver-operator@sha256:fa2ac33c51735af7a19177f8f704155560703472b396b899d6ebd5efae15f414_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:6ab882086dd93f5c5d449563acd4ef684aafc1edb64617c9d3c5d27e22df701a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:b7566a69cd551fe17f19e12b61773839a8ea8449fdd11eafd65822e785594ef8_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-update-keys@sha256:d60caa2be9c5c8ca9880b14386b7198a25501cfdd944d6c6e966474b1127980e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:21a86ab5e452754362030de396c403be075c40f1f388d8b88873c5bfa3011afe_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:95a8161e5c8559d5f020fa2ae3b925ff9f0da5a35bbd7229573668d4471753b4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-cluster-version-operator@sha256:eefa0a7ba4d60046f24b5ceec863988603203433a6371f54266009e34e364188_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:61218645e53e09d26952b9ddcec7d340c4dddd91f12593c41c7d0ba135e9a0d0_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:a6ce033b20397eb492a029ff6e6897698875f903faf73aa7b5d728cd7449c59a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-configmap-reloader@sha256:e0c86bd5b3635057c063b3869e748021c8bba9b3aa72dbcaae2e8b56b8897a03_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:3449774490e4e9f80d8abf094baae39674e9ae34882b102413caf81df6adb5f4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:6edfafba5df9424b493fe23c0334db15564087701b823a1a4381a61e002e9363_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console-operator@sha256:fada29ba6745e379206b709fe3cdca680c73073c7d0a23719164654e50c28681_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:2891ce33136f38b81baa6149e8b4605e1189f089933209d5ba8f8827831e7ef8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:b9d97e14d5f245dde77e99a9fc8c173a045d94bcb677be6978c468b502d14127_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-console@sha256:ead8db21e05f6cb4c448ba59d5875c106184a1267ac1d8f1f58ac33ef510ca3a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:359457364451144b33f9e9bc21768de976f7141efef0e9037e02adb3b796a049_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:74fd9d60b8a8a2a784d4ca59d245bb0225194eee2245aa242b0f8f8cc980d3c4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-coredns@sha256:d07b151c8d34eb12a4a3c0c5196030c13e897015f9db1c4e89dd5099d0ab5ff9_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller-rhel7@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:2f7a08d8b4badf394eb83a140259bbac121c1259ce4bdd60d4e9b5326d2e77ca_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:4fc0e1d177fdcc8a72b4a1829e496a67ed01185fba18cefda60ac0984bcfb853_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-csi-snapshot-controller@sha256:54f2523c777b80bf30b549712e0bcf40f367224314135307dd456a8d26660695_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:4d7e37f46ba781e6582caff38e2721534956bb57661ec944b2de946f91b65bd1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:62e55a30914d9bec7b33c8035f87835a97a3d9f7df2c735f5fa46c25d7f0fef7_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-deployer@sha256:f679dc04b43f6e64bd5793951dbea641cbeb96f523089318c5bcde8921bd7b6b_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:37e6dd9f32469355e31877ae5b867dc988e29dd952cac7aa64d96801f49ee821_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:3aa94ca4dc0b639badfbb98e3561996ed89aa658ad7efe7b427c4dc4c5ad7b6d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-builder@sha256:b94f10f59669e7f7f2a978fb01352e43ab9fff5a9c8984020893f29d37649dc2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:36fdd8bedd6c288eab6802ce92553432f5ad9cfd9d755026610f69e3f5eec638_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:9297b830c7dbcd96f5290d6497a13d3e08d9d0191fce5e579611ca6741576a0c_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-docker-registry@sha256:f481b90c27d4e50abb4d01819bc8d8965270172c80b9501598cb391abcb73256_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:021f887dca1ca1c2983564ed1061f1e331bf391b8e7300036fa69f725c7e8492_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:6e428150e2f629fa8b630d2eb6068050404940aff4cd58df1ab9c46a045696bb_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-etcd@sha256:a43eebdc71c278e60f55f1ef8dea3616f35bb5d313a148c1634f2d93e927b196_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:9d933742788b107f6c065b108e7b415290b73e5161097c89c9eeb49a5468bfc3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:a396aa7034935f6e36c7e32087bad958d12571f719c1046921062e9a782bbcb2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-grafana@sha256:fd2adecabef93c1bc7c36a08b8ec776d9b962743b0c17144f3dc1b9b7fc0dc50_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:67ab76be8ba5b60199cac7c547a45cfdf81455fc5eecd7d396e053616fcfa097_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:bacb6c7e07b03066001c1699a28d4b816485b3cb852945dbdd5bab235c29a4cd_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-haproxy-router@sha256:cbab6017c8b0b09b16f6100040217c526e17efa7dc5945f01b4bee78c745bf7b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:1e94dd17e1b53d863cc9b3dd529d99f8ae1a6a2055c7be4dc29875ba0c4b122e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:5447bbbd83f0c9cb09d3332f74624ec47f369bbdcee1706f645b40aaa000db86_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-hyperkube@sha256:74e7e7b5082dbe6ad9a129854d1d0aab8fb2086e430867bf27eb594edd118842_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:1d945653f34ce6beba72f04434cc5e5c32b40aae9f43e8274cfafbfd7217ba3f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:39adb15c56ccdc0ceac12e2548fd1f50ecfd7465364346b0543de4884a9a3869_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer-artifacts@sha256:e2dcb61bc4ff31d8d3d590a67bd27c86d1e9f6955c60cfe1dc44779be2bf152e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:5d895773fa88843d958d7c6cd7cb681a04db042abce9351606ed682a870cca1c_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:d8b1e88a36e647cdd6ed3fc679e2ad4772440a3f5057cf8111d23dff215b4173_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-installer@sha256:deed786f9faf993b8273b1d5324916cbe593bca6c595cacf9b241e5adf1d18de_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:0071e54531da7b5bcf3fda0221a41c93d72b8c33d8bf499b8cbcbd57fe3f6000_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:057567f4a1ab9b49532dc3cc3e7167447fe6c7b7b1e6258ece1df4a649e87b26_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins-agent-maven@sha256:bf47e3f6309f6b9ec8a56ccdab2d1a321dfef50261d768c8df0e4f6be8b1f337_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:37420994642a1b7ac20657c944dd9be51d81637a8e5eb9557ad0b7712f946517_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:50c771a789c452728f155db0e3cec5de3b23ed1570c56b31b7a2b4e35795dee6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-jenkins@sha256:a3f3237b2f9bdea896dc8c245ce1b29e9dc84d68ab0d615e22db2e0d9356ff90_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:03cacfbcf89365eb35950ab822f84b8b15e0ef37c7731b66f88138cf12ec2624_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:13dbf6166e282f5c0095bc1a5f0bc5e2466ff7448c547831fbbc954be07b40e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-k8s-prometheus-adapter@sha256:df6967e57e10e93a285bf233a934a4c9c3b027888417d540c9d17888f109ad10_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:2eb75e74f11ef3b931d598e5a700fe4369efc50bff3d37ae0271858e662ef4be_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-keepalived-ipfailover@sha256:9306d641af3e45b282d78593fe79ccb4db102b810ed0ee84c2a6d5fd1f463539_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:2dd6619c1a405f3da1ab8a53697761a4ac53c9fb7461d34c1c7958bb9f32966a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:418acca378cf33bcc4e007036c8add22455101185377a9aceadf53c911f29615_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-proxy@sha256:5ec5f29cf41261fa43e683594ecdf6760b7be3d3871f8105601e404e66f37518_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:37b2ccfcdf0ff37cfa96f5e21a7c3f804f1a8ffb6b952392144cdc274530dc96_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:e9407507fdc289e393aac80189cefc0781e05d9ffdd5cecad0a6ed25b10f0b18_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-rbac-proxy@sha256:ee3b8908bb98a2afdad2fcd6a7a10c0c2c38feed397a77b7db19a4df44a017c1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:19e34f6120f502ab40a818fc3d8e230bddc4f657329832fbea003c8127dfd29b_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:8fa2760a620b762105feb4d93b5a35f73cf496babcba3f762505931af6dcd9e5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-kube-state-metrics@sha256:f99ae469226d341a4f4f6a30595d9fd1c71ddeb363a2869f9cb40f4cfa9a8833_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:45fe58b6b05490aa315a12c5d24439435efc1a1e4e494e83d9a5019310e872a4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:6c2db6a836a57e67da40204196b7c8b9a4d9e955ef42df56041cf9ff0f34c738_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-libvirt-machine-controllers@sha256:de2a79e0d9bb424857a6f9a3fabeddfa66bc9d675a2ea8a4e957ad7bb1317b6f_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:be086569665a9a73f1e5f5cf59590b446513d6672323b6bc346f9cb4c4d1a950_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:c3af8bbab455b06a30c7a701f71154ebdaea7bdd6701b9a2311b5f216e193f92_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-local-storage-static-provisioner@sha256:df89a32fd150974395acc331acb04cff41742e4a861b2ba8e27910283079d930_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:24feed8b42000846fd5fa9864d3d521e9688ecadfce41676999c451e375c2ee5_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:b5203eac940ea53d4065c09418fc529d8fcba65c674b9b9d63bd10e107d3d4e6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-api-operator@sha256:e6e64d895b3d9415cf93f074fcbb650ade42154060723399582f4705a36e2d37_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:32182e9ca87bd8696559f9a0ace458b208291d0de4273219414c3bdc9ba3b8ef_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:dd568339ee5b008b6fd902af0edebc34927650f5c4e1818cea3f5e72a7c20267_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-machine-config-operator@sha256:fea86a13892fd52b7842a8237f0540b26551b8488f934906e6079dc27cf1af97_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:28d5b1b3da82aa87f6d2ccabc9bf4c74e43103f9827260e87418e55b9f0802d7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:3424c1847089f4dd5b4383ba7e55040296dee6df292ccd177d335dec57316c61_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-admission-controller@sha256:985cd12b5d4512d762ff88f02f0d19e94b07a3007fb7ba5db3b212466fd6791d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:75fb47d05d298ba4f71744f9cbe7fce9b9246ae2b33d537d3dae7cf1299d51bc_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:c459f6b6f84f939a0028069b19407d440f0fcee2563880350089464082a2748c_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-multus-cni@sha256:ef859afa7f49c2c5775f9b4ca9c5aafd585718ec3190fc66e865a6a239042925_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:2f3d142d13081954fc73e1d5e6ee96a04ba7c5714e9193f985d0a6962d325841_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:553307e32d7e5650e1873f5802f418e7494b6613e200ed777d7f1c2525486722_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-must-gather@sha256:d9436f1e17f8b92096dbefa482d2d9d5e750468c45a232a31054ef3ab20c84a2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:7c17e480cff1dbc805ee3dc389acfd02fafc12894cac2b36e07f95e82f2e06f1_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:eec612209a18d67830f189396a7cdf74dae359bfe6b2e01b995f1aeba11dd9fe_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-proxy@sha256:f00390dbb4aa26a318c48ac88c4aa7f3e0a71895b7597d65e888c965ac22ded6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:3b8835bd9589ffdbb4126c1599a8c6f24570e6b7302b2588310a47f546d08408_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:a422814125b87c879b49751f4d93c6530e503c34b97bb404c324641d070827ac_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-oauth-server-rhel7@sha256:f7d60ee82c312d3f4d03f5e8b53a607a68b195dc54f71ec1392707f1ac7018d3_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:14228b5d967f8fb988bf09cc9e6fdc9ed39fd6da87fa4362485263c0a98e7c20_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:9c1e3124f2ef293fa796abf14c852d8217d4a7443a5f21e14d328a803361b70f_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-openstack-machine-controllers@sha256:c4b500a7542c5ad91d9f6b9326a59c489b5354768e19d2139d0df867879ce14a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:9621572a459e1833e2668a32f8bbe66f056b8bbb9cd98243d54c6e17fd695dce_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:c14cc22b3b433ab93415a555cd7d1bf7df00d672e7c62c0289a9c745464e6d32_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-lifecycle-manager@sha256:ecfc9f64a21f102bafa5371bb451cca6a3365c39f7335cba4885858ae02fe0f2_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:0f69d93c80a568bbc62aaae6187938dbc36e5556f9ecde509b943b68d3dc1fa2_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:241599aa502207daca7fba579e36905f8f6fb04bdc51a310471c65e906ca394d_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-marketplace@sha256:3379c7a0c98817c0100e770e5edd1289562be5461ae6b7f35976a74c155790d2_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:2794f6dd07830a3d56c42d09443596b57aaa93aa5cee7c94e37cdac5a37b8a3e_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:d768b849a69afe135b256c27e2c1037b75499f18f18f6e7e77e33e4e7b663e64_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-operator-registry@sha256:ebd8bca0546081088e35bba512987f05fc5b585597870ff961d91c2a49a60459_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:55ae4c617b4a8b839db06ea631acf4a080235c4da6f5726ea950f937dbe1c1f6_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:88341113c6ed6afef34078e95adc54176e521ee0b0a9c628cd3f338f8c877221_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-ovn-kubernetes@sha256:c464024900e8ad163446b6353d7aa31cd7c51cc75c72109f7b5362e384d4dacf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:1bc6219af0b2aa0b68b619ff4d9d5bb134fc82d4b36582fae8a64e0745b35a93_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:98ad60bc6066a9f2286e88f8c84cf4fd634c7677e92c42b2cb133a78e1d7da7e_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-pod@sha256:d5a3d31ec6bcd441b8d82b65f8c0de2013e54db82a7b843ec7944c6517736a4a_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:0db775b408a28fd877f2e78a8c30e1728c5619eff633ee85f99e5244330c0da9_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:2ba5a4eda7c26e4bff99905ba1aabbf0e8fbad0c0de11ba5842471922569bda6_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prom-label-proxy@sha256:db2576a43832b79ebfcf16f490798408ac1249e747ba02da56b753ec011e1e54_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:097c1429bd377b5584425e5be25a5f8ac3a2fd842a9d78620e2f537607482448_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:429793b47e738d1f9365a4edea1364e7da995e45de3f6111a8335d248db81e85_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-alertmanager@sha256:fc036460dbc5711991a0c1f7eb406373acd64d1500797e40120a9ea10b1d4fb8_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:25935aff089bc2c13b109ed2bf78584a8250304c584aa9bc4088fe242ce4d3cf_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:686a54c8ed84b8d2629214ee88bf931d81686af5cbaa28a62ac2c2407cb0faa1_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-config-reloader@sha256:74a8f31a81047b45525f95bdcbd017bab0c40e5ed10b7ec38c69cf4265a1e08f_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:69c2216cc8adad4edbe82f34df38a99448db46b7dd58585750496ab29e3c9d3b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:6f7a9cecb85e2b7296605fd446710edebda29133ec9855e495b0c5eb0003fb5a_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-node-exporter@sha256:9b8584cbfdfdd2767d0b1b055535cab845f4194dcba6f4fb23ff0ef436e1e0e3_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:06bc4067d7f6a4aa3b894e1fc2dc7cc8bbf56dc03a243c88592e3e6525e150ce_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:24968533fd893b83c3f069903ce2bcae563fb637000a3ddaf5e749b763a60a7e_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus-operator@sha256:de49c6d6c76830436e49a0390d69c645a04a667cf7822e0f9e93541c93127a8a_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:4ef964eb2399bc557d3dbbe692c53ba1511ed2ee28513cae1bc474bd6e019d66_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:7e3a9f8f1917b983d2ef5af13426ac8ad951a7d5d7877e25fc85d6dbffab7bf4_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-prometheus@sha256:b1a597069362c1f9ccbc55e6d21f5b5b43e648a7ebf11b7e05cf4f676bf036c4_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:01c7cdaa2d0c24a2711a3b4787029cef997b0a35be8586d33bea34f022f3d9a7_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:eb2f02ef695abeada4d97835363f60859eb5df625a52940cc841bd3e9d35fde3_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-service-ca-operator@sha256:ffdcbde00459cc0b4965a0bc6db8187891fa46b483518f9243ebb05d665bddf1_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:2d5921f102f888986b371e1e680b011429321bcc4efdc9aa44949c205159b406_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:78589e54be40342d0f939840ebe9104b92da461ee19a163df60a5035f2f14185_amd64", "7Server-RH7-RHOSE-4.5:openshift4/ose-telemeter@sha256:c54de0869823d96514a9969ef734780b96a2b9ea9e400a52336f218066d7c43d_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:c290c3ed55bf2f4a06f63ee325428943d82ff958b3d90ecc8413f6dc492c4065_ppc64le", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:e8cadde6f5524ae0df3073bc9efc1b683a6acb87ee3f44837c2568a6e5ad710b_s390x", "7Server-RH7-RHOSE-4.5:openshift4/ose-tests@sha256:fd78c0aa141873f95f8160db2eefc82438d5c75800ecdbf3cf4b483ecf57245c_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:a47f4d5b37bcb60dc2b3b40fd24fa72185106daecdfb79a48a8882a682fc15be_amd64", "8Base-RHOSE-4.5:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:c257f011f009454cb69d8f1f153ffe892b5f1cc3b7fb836d5e4a152574733162_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:593444cab0cab3ea9bda9af889c8d85642e9b74ba2ec8ac4acd61f1bfe89f420_ppc64le", "8Base-RHOSE-4.5:openshift4/ose-ironic-rhel8@sha256:5a706b037bc0bbc31d8f833ea1ac00c43dbc72941ef3a6ac592a1eedbd604909_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:37c68e76961229660836a13acb07771251f0839fe057eb19f4f7adfc37665db7_amd64", "8Base-RHOSE-4.5:openshift4/ose-kuryr-cni-rhel8@sha256:b593cb1dc820e3fbf1371d2e774c9e169d01eec56845a7f0cdcd7e77660192a3_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_5649
Vulnerability from csaf_redhat
Published
2020-12-22 04:53
Modified
2024-11-13 22:17
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.11 security update
Notes
Topic
An update is now available for OpenShift Service Mesh 1.1.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for OpenShift Service Mesh 1.1.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5649", "url": "https://access.redhat.com/errata/RHSA-2020:5649" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5649.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.11 security update", "tracking": { "current_release_date": "2024-11-13T22:17:40+00:00", "generator": { "date": "2024-11-13T22:17:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2020:5649", "initial_release_date": "2020-12-22T04:53:46+00:00", "revision_history": [ { "date": "2020-12-22T04:53:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-12-22T04:53:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:17:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.1", "product": { "name": "OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "ior-0:1.1.11-2.el8.src", "product": { "name": "ior-0:1.1.11-2.el8.src", "product_id": "ior-0:1.1.11-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.11-2.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-20.el8.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-20.el8.src", "product_id": "servicemesh-prometheus-0:2.14.0-20.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-20.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-cni-0:1.1.11-2.el8.src", "product": { "name": "servicemesh-cni-0:1.1.11-2.el8.src", "product_id": "servicemesh-cni-0:1.1.11-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.11-2.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.11-2.el8.src", "product": { "name": "servicemesh-0:1.1.11-2.el8.src", "product_id": "servicemesh-0:1.1.11-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.11-2.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-19.el8.src", "product": { "name": "servicemesh-grafana-0:6.4.3-19.el8.src", "product_id": "servicemesh-grafana-0:6.4.3-19.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-19.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.11-3.el8.src", "product": { "name": "servicemesh-operator-0:1.1.11-3.el8.src", "product_id": "servicemesh-operator-0:1.1.11-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.11-3.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ior-0:1.1.11-2.el8.x86_64", "product": { "name": "ior-0:1.1.11-2.el8.x86_64", "product_id": "ior-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-20.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-cni-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-cni-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-cni-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-citadel-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-galley-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-galley-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-galley-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-galley@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-mixc-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-mixs-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64", "product": { "name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64", "product_id": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.11-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64", "product": { "name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64", "product_id": "servicemesh-grafana-0:6.4.3-19.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-19.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "product": { "name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "product_id": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-19.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.11-3.el8.x86_64", "product": { "name": "servicemesh-operator-0:1.1.11-3.el8.x86_64", "product_id": "servicemesh-operator-0:1.1.11-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.11-3.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src" }, "product_reference": "ior-0:1.1.11-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64" }, "product_reference": "ior-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src" }, "product_reference": "servicemesh-0:1.1.11-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-citadel-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-citadel-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.11-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src" }, "product_reference": "servicemesh-cni-0:1.1.11-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-cni-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-galley-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-galley-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-19.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src" }, "product_reference": "servicemesh-grafana-0:6.4.3-19.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-19.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64" }, "product_reference": "servicemesh-grafana-0:6.4.3-19.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64" }, "product_reference": "servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.11-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src" }, "product_reference": "servicemesh-operator-0:1.1.11-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.11-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64" }, "product_reference": "servicemesh-operator-0:1.1.11-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-20.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-20.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64" }, "product_reference": "servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-22T04:53:46+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5649" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-22T04:53:46+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5649" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:ior-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-19.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.11-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.11-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-20.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.11-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2021_1366
Vulnerability from csaf_redhat
Published
2021-05-04 19:34
Modified
2024-11-22 16:38
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.7.9 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.7.9 is now available with
updates to packages and images that fix several bugs.
This release includes a security update for Red Hat OpenShift Container Platform 4.7.9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.7.9. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHSA-2021:1365
All OpenShift Container Platform 4.7 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
-between-minor.html#understanding-upgrade-channels_updating-cluster-between
-minor
Security Fix(es):
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)
* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.7.9 is now available with\nupdates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.7.9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.7.9. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2021:1365\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1366", "url": "https://access.redhat.com/errata/RHSA-2021:1366" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "1953464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953464" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1366.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.9 packages and security update", "tracking": { "current_release_date": "2024-11-22T16:38:01+00:00", "generator": { "date": "2024-11-22T16:38:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1366", "initial_release_date": "2021-05-04T19:34:17+00:00", "revision_history": [ { "date": "2021-05-04T19:34:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-04T19:34:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T16:38:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "product": { "name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "product_id": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.7.0-202104250659.p0.git.7d0a2b2.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "product": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "product": { "name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "product_id": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "product": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "product": { "name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "product_id": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "product": { "name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "product_id": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.7.0-202104250659.p0.git.d49acc4.el8?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "product": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202104250659.p0.git.95881af.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "product": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202104250659.p0.git.95881af.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "product": { "name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "product_id": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "product_id": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.7.0-202104250659.p0.git.e1b19c2.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product_id": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.7.0-202104250659.p0.git.d49acc4.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "product": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "product": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "product": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "product_id": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202104250659.p0.git.95881af.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "product_id": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202104250659.p0.git.7d0a2b2.el8?arch=s390x" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "product": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "product_id": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202104260636.p0.git.330c6ef.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src" }, "product_reference": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch" }, "product_reference": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src" }, "product_reference": "openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src" }, "product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64" }, "product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src" }, "product_reference": "openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x" }, "product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src" }, "product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64" }, "product_reference": "openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src" }, "product_reference": "openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le" }, "product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x" }, "product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-04T19:34:17+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1366" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-04T19:34:17+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1366" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1897635" } ], "notes": [ { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "RHBZ#1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-04T19:34:17+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1366" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: panic during recursive division of very large numbers" }, { "cve": "CVE-2021-3114", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-01-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1918750" } ], "notes": [ { "category": "description", "text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: incorrect operations on the P-224 curve", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202104250659.p0.git.e1b19c2.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202104250659.p0.git.e1b19c2.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202104260636.p0.git.330c6ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202104250659.p0.git.95881af.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202104250659.p0.git.7d0a2b2.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202104250659.p0.git.d49acc4.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202104250659.p0.git.d49acc4.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3114" }, { "category": "external", "summary": "RHBZ#1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w", "url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w" } ], "release_date": "2021-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-04T19:34:17+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1366" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-3.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: incorrect operations on the P-224 curve" } ] }
rhsa-2021_4103
Vulnerability from csaf_redhat
Published
2021-11-02 17:36
Modified
2024-11-22 16:37
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.9.0 RPMs security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.9.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 4.9.0 RPMs.
Security Fix(es):
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.9.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 4.9.0 RPMs.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4103", "url": "https://access.redhat.com/errata/RHSA-2021:4103" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1981345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981345" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4103.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.9.0 RPMs security and bug fix update", "tracking": { "current_release_date": "2024-11-22T16:37:41+00:00", "generator": { "date": "2024-11-22T16:37:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:4103", "initial_release_date": "2021-11-02T17:36:11+00:00", "revision_history": [ { "date": "2021-11-02T17:36:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-02T17:36:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T16:37:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.9 for RHEL 7", "product": { "name": "CNV 4.9 for RHEL 7", "product_id": "7Server-CNV-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el7" } } }, { "category": "product_name", "name": "CNV 4.9 for RHEL 8", "product": { "name": "CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "kubevirt-0:4.9.0-287.el7.src", "product": { "name": "kubevirt-0:4.9.0-287.el7.src", "product_id": "kubevirt-0:4.9.0-287.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@4.9.0-287.el7?arch=src" } } }, { "category": "product_version", "name": "kubevirt-0:4.9.0-287.el8.src", "product": { "name": "kubevirt-0:4.9.0-287.el8.src", "product_id": "kubevirt-0:4.9.0-287.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@4.9.0-287.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "product": { "name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "product_id": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.9.0-287.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.9.0-287.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "product": { "name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "product_id": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.9.0-287.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.9.0-287.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:4.9.0-287.el7.src as a component of CNV 4.9 for RHEL 7", "product_id": "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src" }, "product_reference": "kubevirt-0:4.9.0-287.el7.src", "relates_to_product_reference": "7Server-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64 as a component of CNV 4.9 for RHEL 7", "product_id": "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64" }, "product_reference": "kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "relates_to_product_reference": "7Server-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64 as a component of CNV 4.9 for RHEL 7", "product_id": "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "relates_to_product_reference": "7Server-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:4.9.0-287.el8.src as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src" }, "product_reference": "kubevirt-0:4.9.0-287.el8.src", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64" }, "product_reference": "kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64", "relates_to_product_reference": "8Base-CNV-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-02T17:36:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4103" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-02T17:36:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4103" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2021-3114", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1918750" } ], "notes": [ { "category": "description", "text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: incorrect operations on the P-224 curve", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3114" }, { "category": "external", "summary": "RHBZ#1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w", "url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w" } ], "release_date": "2021-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-02T17:36:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4103" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: incorrect operations on the P-224 curve" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-02T17:36:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4103" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-4.9:kubevirt-0:4.9.0-287.el7.src", "7Server-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el7.x86_64", "7Server-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el7.x86_64", "8Base-CNV-4.9:kubevirt-0:4.9.0-287.el8.src", "8Base-CNV-4.9:kubevirt-virtctl-0:4.9.0-287.el8.x86_64", "8Base-CNV-4.9:kubevirt-virtctl-redistributable-0:4.9.0-287.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" } ] }
rhba-2021_0075
Vulnerability from csaf_redhat
Published
2021-01-12 09:34
Modified
2024-11-13 22:07
Summary
Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.17.8 Operator/Operand Containers
Notes
Topic
Red Hat OpenShift Jaeger 1.17.8.
Details
Release of Red Hat OpenShift Jaeger provides these changes:
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Jaeger 1.17.8.", "title": "Topic" }, { "category": "general", "text": "Release of Red Hat OpenShift Jaeger provides these changes:", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2021:0075", "url": "https://access.redhat.com/errata/RHBA-2021:0075" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0075.json" } ], "title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.17.8 Operator/Operand Containers", "tracking": { "current_release_date": "2024-11-13T22:07:36+00:00", "generator": { "date": "2024-11-13T22:07:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHBA-2021:0075", "initial_release_date": "2021-01-12T09:34:21+00:00", "revision_history": [ { "date": "2021-01-12T09:34:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-12T09:34:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:07:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Jaeger 1.17", "product": { "name": "Red Hat OpenShift Jaeger 1.17", "product_id": "8Base-JAEGER-1.17", "product_identification_helper": { "cpe": "cpe:/a:redhat:jaeger:1.17::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Jaeger" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "product": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.17.8-12" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.17.8-12" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "product": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.17.8-10" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "product": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.17.8-11" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "product": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.17.8-9" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "product": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.17.8-12" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "product": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "product_id": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.17.8-10" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64", "product": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64", "product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.17.8-11" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64" }, "product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "relates_to_product_reference": "8Base-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "relates_to_product_reference": "8Base-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64" }, "product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "relates_to_product_reference": "8Base-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64" }, "product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "relates_to_product_reference": "8Base-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64" }, "product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "relates_to_product_reference": "8Base-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "relates_to_product_reference": "8Base-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64" }, "product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "relates_to_product_reference": "8Base-JAEGER-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64 as a component of Red Hat OpenShift Jaeger 1.17", "product_id": "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64" }, "product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64", "relates_to_product_reference": "8Base-JAEGER-1.17" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-12T09:34:21+00:00", "details": "Red Hat OpenShift Jaeger Release", "product_ids": [ "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:0075" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-12T09:34:21+00:00", "details": "Red Hat OpenShift Jaeger Release", "product_ids": [ "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:0075" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.17:distributed-tracing/jaeger-agent-rhel8@sha256:e50a0aabf41bd8557cddf6d211d3a4fe3eeefd76c69f214764a46d39f30243f6_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-all-in-one-rhel8@sha256:34c921522039f5e5e0ba5ae1a6ba23770bb9c0764741af3962e61b482d7e1944_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-collector-rhel8@sha256:882b833099b6dc5fafee6aae4bba040ca1c2b503832e16f0197fe37bec1bd53a_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:033d0bd0557820974ec5a5be32cf94a30bfec7bc105c8733b0875357f6ff3f68_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-es-rollover-rhel8@sha256:f9e37212306aa89aa9cded345c4a904cf9a32e37945acd59ea205e90d9850252_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-ingester-rhel8@sha256:d1537f420ca359d42f6fd08e172141c79f8620a1f127f26b2752a88e0ad74ee7_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-query-rhel8@sha256:d49f6f7ecf7ddbd1396dd90e010e8e5114a00599d3d8634b8637223588d8373d_amd64", "8Base-JAEGER-1.17:distributed-tracing/jaeger-rhel8-operator@sha256:5d213b8efda4306a4f6f9044514e774273844979ac8eff800a5b26df2fbab66f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2021_0172
Vulnerability from csaf_redhat
Published
2021-01-25 19:45
Modified
2024-11-22 15:52
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.6.13 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.6.13 is now available with updates to packages and images that fix several bugs.
A security update for cri-o, openshift, openshift-clients, openshift-kuryr, and skopeo is now also available for Red Hat OpenShift Container Platform 4.6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 (CVE-2020-8564)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.6.13. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHSA-2021:0171
All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.6.13 is now available with updates to packages and images that fix several bugs.\n\nA security update for cri-o, openshift, openshift-clients, openshift-kuryr, and skopeo is now also available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4 (CVE-2020-8564)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.13. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2021:0171\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0172", "url": "https://access.redhat.com/errata/RHSA-2021:0172" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1886637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637" }, { "category": "external", "summary": "1917413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917413" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0172.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.13 packages and security update", "tracking": { "current_release_date": "2024-11-22T15:52:37+00:00", "generator": { "date": "2024-11-22T15:52:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0172", "initial_release_date": "2021-01-25T19:45:30+00:00", "revision_history": [ { "date": "2021-01-25T19:45:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-25T19:45:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:52:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "product": { "name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "product_id": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202101160934.p0.git.94242.fc5242e.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "product": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src", "product": { "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src", "product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "product": { "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "product": { "name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "product_id": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "product": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "product": { "name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "product_id": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202101160934.p0.git.3808.a1bca2f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "product": { "name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "product": { "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product": { "name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "product": { "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "product": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "product": { "name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "product_id": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "product": { "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "product_id": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "product": { "name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "product_id": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "product": { "name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "product_id": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "product": { "name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "product_id": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-3.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "product": { "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "product_id": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "product_id": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "product_id": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.1-4.rhaos4.6.git3846aab.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "product_id": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202101160934.p0.git.94242.fc5242e.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "product": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "product_id": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202101160934.p0.git.3808.a1bca2f.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product_id": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202101151835.p0.git.2220.40847e5.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src" }, "product_reference": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src" }, "product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le" }, "product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x" }, "product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64" }, "product_reference": "containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le" }, "product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x" }, "product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src" }, "product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64" }, "product_reference": "cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src" }, "product_reference": "openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x" }, "product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src" }, "product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src" }, "product_reference": "openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src" }, "product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Nikolaos Moraitis" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8564", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886637" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8564" }, { "category": "external", "summary": "RHBZ#1886637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8564", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95622", "url": "https://github.com/kubernetes/kubernetes/issues/95622" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T19:45:30+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0172" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T19:45:30+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0172" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T19:45:30+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0172" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1897635" } ], "notes": [ { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el7.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.1-4.rhaos4.6.git3846aab.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202101160934.p0.git.3808.a1bca2f.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202101160934.p0.git.94242.fc5242e.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202101151835.p0.git.2220.40847e5.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "RHBZ#1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T19:45:30+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0172" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-3.rhaos4.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: panic during recursive division of very large numbers" } ] }
rhsa-2021_1515
Vulnerability from csaf_redhat
Published
2021-05-06 13:38
Modified
2024-11-24 21:25
Summary
Red Hat Security Advisory: Openshift Logging Bug Fix Release (5.0.3)
Notes
Topic
Openshift Logging Bug Fix Release (5.0.3)
This release includes a security update.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Openshift Logging Bug Fix Release (5.0.3)
Security Fix(es):
* jackson-databind: arbitrary code execution in slf4j-ext class
(CVE-2018-14718)
* jackson-databind: arbitrary code execution in blaze-ds-opt and
blaze-ds-core classes (CVE-2018-14719)
* jackson-databind: improper polymorphic deserialization in
axis2-transport-jms class (CVE-2018-19360)
* jackson-databind: improper polymorphic deserialization in openjpa class
(CVE-2018-19361)
* jackson-databind: improper polymorphic deserialization in
jboss-common-core class (CVE-2018-19362)
* jackson-databind: default typing mishandling leading to remote code
execution (CVE-2019-14379)
* jackson-databind: Serialization gadgets in
com.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.apache.commons.dbcp2.datasources.PerUserPoolDataSource (CVE-2020-35490)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.apache.commons.dbcp2.datasources.SharedPoolDataSource (CVE-2020-35491)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
(CVE-2020-35728)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36179)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36180)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36181)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36182)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-36183)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
(CVE-2020-36184)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
(CVE-2020-36185)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
(CVE-2020-36186)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
(CVE-2020-36187)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
(CVE-2020-36188)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to
com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSourc
e (CVE-2020-36189)
* jackson-databind: mishandles the interaction between serialization
gadgets and typing, related to javax.swing (CVE-2021-20190)
* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)
* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
(CVE-2018-14721)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Openshift Logging Bug Fix Release (5.0.3)\nThis release includes a security update.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Openshift Logging Bug Fix Release (5.0.3)\n\nSecurity Fix(es):\n\n* jackson-databind: arbitrary code execution in slf4j-ext class\n(CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and\nblaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: improper polymorphic deserialization in\naxis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class\n(CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in\njboss-common-core class (CVE-2018-19362)\n\n* jackson-databind: default typing mishandling leading to remote code\nexecution (CVE-2019-14379)\n\n* jackson-databind: Serialization gadgets in\ncom.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.PerUserPoolDataSource (CVE-2020-35490)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.datasources.SharedPoolDataSource (CVE-2020-35491)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool\n(CVE-2020-35728)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\noadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36179)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36180)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS (CVE-2020-36181)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS (CVE-2020-36182)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-36183)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource\n(CVE-2020-36184)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource\n(CVE-2020-36185)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource\n(CVE-2020-36186)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource\n(CVE-2020-36187)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource\n(CVE-2020-36188)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSourc\ne (CVE-2020-36189)\n\n* jackson-databind: mishandles the interaction between serialization\ngadgets and typing, related to javax.swing (CVE-2021-20190)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class\n(CVE-2018-14721)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1515", "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "LOG-1224", "url": "https://issues.redhat.com/browse/LOG-1224" }, { "category": "external", "summary": "LOG-1232", "url": "https://issues.redhat.com/browse/LOG-1232" }, { "category": "external", "summary": "LOG-1234", "url": "https://issues.redhat.com/browse/LOG-1234" }, { "category": "external", "summary": "LOG-1299", "url": "https://issues.redhat.com/browse/LOG-1299" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1515.json" } ], "title": "Red Hat Security Advisory: Openshift Logging Bug Fix Release (5.0.3)", "tracking": { "current_release_date": "2024-11-24T21:25:33+00:00", "generator": { "date": "2024-11-24T21:25:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1515", "initial_release_date": "2021-05-06T13:38:14+00:00", "revision_history": [ { "date": "2021-05-06T13:38:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-06T13:38:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T21:25:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Logging 5.0", "product": { "name": "OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:logging:5.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "product_id": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "product_id": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "product_id": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "product": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.0.3-6" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "product": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.0.3-6" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "product_id": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "product_id": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "product_id": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.0.3-2" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "product_id": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "product_id": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v5.0.3-1" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "product_id": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v5.0.3-1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64" }, "product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64" }, "product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64 as a component of OpenShift Logging 5.0", "product_id": "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14718", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666415" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in slf4j-ext class", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14718" }, { "category": "external", "summary": "RHBZ#1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in slf4j-ext class" }, { "cve": "CVE-2018-14719", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666418" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14719" }, { "category": "external", "summary": "RHBZ#1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes" }, { "cve": "CVE-2018-14720", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666423" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: exfiltration/XXE in some JDK classes", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14720" }, { "category": "external", "summary": "RHBZ#1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: exfiltration/XXE in some JDK classes" }, { "cve": "CVE-2018-14721", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666428" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14721" }, { "category": "external", "summary": "RHBZ#1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class" }, { "cve": "CVE-2018-19360", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666482" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19360" }, { "category": "external", "summary": "RHBZ#1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19360" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class" }, { "cve": "CVE-2018-19361", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666484" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in openjpa class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19361" }, { "category": "external", "summary": "RHBZ#1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19361" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in openjpa class" }, { "cve": "CVE-2018-19362", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666489" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19362" }, { "category": "external", "summary": "RHBZ#1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2020-24750", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-09-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882310" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.6. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* OpenShift Container Platform\nThese products may update the jackson-databind dependency in a future release.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24750" }, { "category": "external", "summary": "RHBZ#1882310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24750", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24750" } ], "release_date": "2020-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.pastdev.httpcomponents in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration" }, { "cve": "CVE-2020-35490", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-12-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1909266" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35490" }, { "category": "external", "summary": "RHBZ#1909266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909266" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35490", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35490" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35490" }, { "category": "external", "summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2986", "url": "https://github.com/FasterXML/jackson-databind/issues/2986" } ], "release_date": "2020-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource" }, { "cve": "CVE-2020-35491", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-12-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1909269" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35491" }, { "category": "external", "summary": "RHBZ#1909269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909269" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35491", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35491" }, { "category": "external", "summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2986", "url": "https://github.com/FasterXML/jackson-databind/issues/2986" } ], "release_date": "2020-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid org.apache.commons.dbcp2.datasources.PerUserPoolDataSource and org.apache.commons.dbcp2.datasources.SharedPoolDataSource in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource" }, { "cve": "CVE-2020-35728", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-12-27T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1911502" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat Products ship jackson-databind version 2.10.0 or later which is not considered affected by this CVE (see https://medium.com/@cowtowncoder/jackson-2-10-safe-default-typing-2d018f0ce2ba) \n* JBoss Data Grid 7\n* JBoss Data Grid 8\n* Enterprise Application Platform 7\n* Red Hat Decision Manager 7\n* Red Hat Process Automation Manager 7\n* Red Hat Single Sign-On (RH-SSO) 7\n* Red Hat JBoss Fuse 7\n* Red Hat JBoss A-MQ\n* Red Hat Enterprise Linux 8\n* Red Hat Satellite 6.6\n* Red Hat Satellite 6.7\n* Red Hat Satellite 6.8\n* Red Hat CodeReady Studio 12\n\nRed Hat OpenShift Container Platform and Red Hat OpenStack Platform does ship the vulnerable components, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and may be fixed in a future update.\n\nRed Hat OpenStack Platform 13 ships OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35728" }, { "category": "external", "summary": "RHBZ#1911502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35728", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35728" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35728" }, { "category": "external", "summary": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2999", "url": "https://github.com/FasterXML/jackson-databind/issues/2999" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-36179", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913871" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36179" }, { "category": "external", "summary": "RHBZ#1913871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36179", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36179" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36179" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36180", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913872" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36180" }, { "category": "external", "summary": "RHBZ#1913872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36180", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36180" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36181", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913874" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but does not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36181" }, { "category": "external", "summary": "RHBZ#1913874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36181", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36181" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36182", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913926" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36182" }, { "category": "external", "summary": "RHBZ#1913926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913926" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36182", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36182" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3004", "url": "https://github.com/FasterXML/jackson-databind/issues/3004" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS" }, { "cve": "CVE-2020-36183", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913927" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36183" }, { "category": "external", "summary": "RHBZ#1913927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36183", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36183" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36183" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/3003", "url": "https://github.com/FasterXML/jackson-databind/issues/3003" } ], "release_date": "2020-12-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-36184", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913928" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36184" }, { "category": "external", "summary": "RHBZ#1913928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913928" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36184", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36184" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2998", "url": "https://github.com/FasterXML/jackson-databind/issues/2998" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource" }, { "cve": "CVE-2020-36185", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913929" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36185" }, { "category": "external", "summary": "RHBZ#1913929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36185", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36185" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2998", "url": "https://github.com/FasterXML/jackson-databind/issues/2998" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource" }, { "cve": "CVE-2020-36186", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913931" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36186" }, { "category": "external", "summary": "RHBZ#1913931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913931" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36186", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36186" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2997", "url": "https://github.com/FasterXML/jackson-databind/issues/2997" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource" }, { "cve": "CVE-2020-36187", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913933" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contain the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36187" }, { "category": "external", "summary": "RHBZ#1913933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36187", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36187" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2997", "url": "https://github.com/FasterXML/jackson-databind/issues/2997" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource" }, { "cve": "CVE-2020-36188", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913934" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, hence it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but they do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36188" }, { "category": "external", "summary": "RHBZ#1913934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36188", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36188" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2996", "url": "https://github.com/FasterXML/jackson-databind/issues/2996" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource" }, { "cve": "CVE-2020-36189", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-01-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913937" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and maybe fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36189" }, { "category": "external", "summary": "RHBZ#1913937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36189", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36189" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2996", "url": "https://github.com/FasterXML/jackson-databind/issues/2996" } ], "release_date": "2020-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid: oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS, org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS, org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool, org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource, org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource, com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource, com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource\nin the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource" }, { "cve": "CVE-2021-20190", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1916633" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do ship the vulnerable component, but do not enable the unsafe conditions needed to exploit, lowering their vulnerability impact:\n* JBoss Data Grid 7\n* Business Process Management Suite 6\n* Business Rules Management Suite 6\n* JBoss Data Virtualization 6\n* Red Hat Fuse Service Works 6\n* Red Hat OpenStack Platform\n* Red Hat OpenShift containers: ose-metering-hadoop, ose-metering-hive, ose-logging-elasticsearch5, ose-logging-elasticsearch6 \nThese products may update the jackson-databind dependency in a future release.\n\nIn Red Hat Openshift 4 there are no plans to maintain the ose-logging-elasticsearch5 container, therefore it has been marked wontfix at this time and may be fixed in a future update. \n\nThe following Red Hat products ship OpenDaylight, which contains the vulnerable jackson-databind, but do not expose jackson-databind in a way that would make it exploitable:\n* Red Hat OpenStack Platform 13\nAs such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe following Red Hat products are not affected by this flaw because they use a more recent version of jackson-databind that does not contain the vulnerable code:\n* CodeReady Studio 12.16.0\n* CodeReady WorkSpaces Server Container\n* Red Hat Enterprise Linux 8\n* Red Hat Enterprise Virtualization\n* Red Hat Satellite 6\n* Red Hat OpenShift container: ose-metering-presto", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20190" }, { "category": "external", "summary": "RHBZ#1916633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916633" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20190", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20190" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-5949-rw7g-wx7w", "url": "https://github.com/advisories/GHSA-5949-rw7g-wx7w" } ], "release_date": "2021-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-06T13:38:14+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nFor Red Hat OpenShift Logging 5.0, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1515" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`\n* avoid javax.swing in the classpath", "product_ids": [ "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-operator-bundle@sha256:523e689589595cff9ee11393506309c00d23bf8fb945e1475aeeffea3d517897_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:0b3edcd073a1f331c011ebcd4aaa8371f9114b78a48e590df450e1e9006404c3_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:c143f6d1ec4d3d9a917a99c65815752e24e93a5be212c8d41a7f945ffffa67cf_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/cluster-logging-rhel8-operator@sha256:f42594e7760bf45ccba9d0494391b07b355d147a8ccfae3db602bceb74d8e35f_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-operator-bundle@sha256:1a88af8ae614593144ab405214444d954aa97ba13baa6ccf3b3498b424f983df_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:667a65330c7ed33805c30896ff9fa979c1aeed8883eb31750af9802f6feb7034_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:a78c13c0c3f17432dee6d22756d6656afffe33081a1db5fad0ab68798fb92580_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-proxy-rhel8@sha256:b2359332ffb463d8af90bcc6871b0a5ff4e79ce82243ba89ace96e18e05964fa_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0264dd99af5af4a7a30c2b5830e52980fc59d050cc940f191b32e09df284292a_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:0dc6a56baad15c9fa6d0669f6f59ba1c6b444ef75e5d2893fa4bdd970bdfe88b_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch-rhel8-operator@sha256:af5c18868820a4d139ad9c7d6a1d0a78396d96deb455b00a918c7eaf2ffbaa8b_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:3b08518f62a113a06a16ca3bcccbc128703f34815d66162426daabfd9740b2c4_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:4e8a4d0bf152d8f50114d13ce51868506570825123b8df4eed426f524c01bde3_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/eventrouter-rhel8@sha256:7a17b1b04fd0d9ae66ad0dfaacbf9bebe44f77449763cd82bd172551c8dd5906_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:508186184b17d924659ad9dcaa468cd4086bbe958b4dac1a6297e7cd4f88a418_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:c9d56d0bfd800bd72c990829b81676a261c288f783ab44788feffdaa00bd069c_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/fluentd-rhel8@sha256:ea0fb56298089dfd6ea04c4933e6e15668fe422b60b521cf1388783797ac7852_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:06f31605e19bd7f702e403b815b961f125d92466e208428547069b3712c7a20e_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:6348d3a07a76aa6eb90d1689cdf67a45559e752aec70d06261596f09d7ebca4f_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/kibana6-rhel8@sha256:c140c1da34f8cb38864f92201ac8c9aa6981318d1bd4ebf87cea698fdb80a6d7_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:7904a53e3117acf2baeae3911c6d1cdfb78964080bf5ff3ff5bff531ca6ef366_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:adbab231c9403261c85b6e4ff2c81c0d19e206106df60fd1551c9e30cb2d83f7_s390x", "8Base-OSE-LOGGING-5.0:openshift-logging/logging-curator5-rhel8@sha256:bb16d7f7ef2310afacf12a11808c3b792ed1f30929ef9a62ff9b094d3d8512cc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:30491b87e69ba242c3eacb607c71c13a9957962c0ae75d63fbb1f7aff12e268b_ppc64le", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:614d1860d95c7e9a84ee68bb507f9970d0af63a7df3e744bd5e5a08a2a617914_amd64", "8Base-OSE-LOGGING-5.0:openshift-logging/elasticsearch6-rhel8@sha256:9dbe9316331f9b7725f39d00dc2bc8433482750c8178066b002682894f92ed87_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing" } ] }
rhba-2020_4229
Vulnerability from csaf_redhat
Published
2020-10-19 13:42
Modified
2024-11-13 22:07
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.15 packages update
Notes
Topic
Red Hat OpenShift Container Platform release 4.5.15 is now available with
updates to packages and images that fix several bugs.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.5.15. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2020:4228
All OpenShift Container Platform 4.5 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.5.15 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.15. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2020:4228\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2020:4229", "url": "https://access.redhat.com/errata/RHBA-2020:4229" }, { "category": "external", "summary": "1887283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887283" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4229.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.15 packages update", "tracking": { "current_release_date": "2024-11-13T22:07:20+00:00", "generator": { "date": "2024-11-13T22:07:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHBA-2020:4229", "initial_release_date": "2020-10-19T13:42:49+00:00", "revision_history": [ { "date": "2020-10-19T13:42:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-19T13:42:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:07:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src", "product": { "name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src", "product_id": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src", "product": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src", "product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "product": { "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src", "product": { "name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src", "product_id": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202010081312.p0.git.0.401534e.el7?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src", "product": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src", "product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src", "product": { "name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src", "product_id": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src", "product": { "name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src", "product_id": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src", "product": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src", "product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src", "product": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src", "product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=src" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src", "product": { "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src", "product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=src" } } }, { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "product": { "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=src" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "product": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le", "product": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le", "product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le", "product": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le", "product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "product": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le", "product": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le", "product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "product": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le", "product": { "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le", "product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x", "product": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x", "product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=s390x" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "product": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x", "product": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x", "product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "product": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "product": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x", "product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x", "product": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x", "product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "product": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=s390x" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x", "product": { "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x", "product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64", "product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202010081312.p0.git.1808.498e523.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "product": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202010081312.p0.git.3607.908b350.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202010081312.p0.git.15.d7814b2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "product": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64", "product_id": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202010091010.p0.git.0.3538ccc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "product": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "product_id": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202010081312.p0.git.3607.908b350.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "product": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "product_id": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "product_id": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.3-19.rhaos4.5.git9264b4f.el8?arch=x86_64" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64", "product": { "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64", "product_id": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202010012007.p0.git.2570.fc7c941.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "product": { "name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "product_id": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202010081312.p0.git.0.401534e.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "product_id": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.5.0-202010081312.p0.git.0.401534e.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product_id": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.5.0-202010091010.p0.git.1998.b73d461.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.24.1.el8_2.dt1?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product_id": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.24.1.el8_2.dt1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x" }, "product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le" }, "product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x" }, "product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src" }, "product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64" }, "product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x" }, "product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src" }, "product_reference": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch" }, "product_reference": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src" }, "product_reference": "openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le" }, "product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x" }, "product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src" }, "product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64" }, "product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x" }, "product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le" }, "product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x" }, "product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src" }, "product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64" }, "product_reference": "cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src" }, "product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src" }, "product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le" }, "product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x" }, "product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src" }, "product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64" }, "product_reference": "machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src" }, "product_reference": "openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x" }, "product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src" }, "product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64" }, "product_reference": "openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src" }, "product_reference": "openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64", "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src", "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64", "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src", "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T13:42:49+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:4229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64", "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src", "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202010081312.p0.git.0.401534e.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202010081312.p0.git.0.401534e.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.src", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el7.x86_64", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.3-19.rhaos4.5.git9264b4f.el8.x86_64", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.5:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.5:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202010012007.p0.git.2570.fc7c941.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.ppc64le", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.s390x", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202010081312.p0.git.3607.908b350.el8.x86_64", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202010091010.p0.git.0.3538ccc.el8.x86_64", "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.src", "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202010091010.p0.git.1998.b73d461.el8.noarch", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.5:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T13:42:49+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:4229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202010081312.p0.git.1808.498e523.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202010081312.p0.git.15.d7814b2.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhba-2020_4139
Vulnerability from csaf_redhat
Published
2020-09-30 14:15
Modified
2024-11-13 22:06
Summary
Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container update
Notes
Topic
An update for 3scale-istio-adapter-rhel8-container is now available for OpenShift Service Mesh.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
The OpenShift Service Mesh Release Notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html
This advisory covers the containers for the release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for 3scale-istio-adapter-rhel8-container is now available for OpenShift Service Mesh.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the containers for the release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2020:4139", "url": "https://access.redhat.com/errata/RHBA-2020:4139" }, { "category": "external", "summary": "MAISTRA-1854", "url": "https://issues.redhat.com/browse/MAISTRA-1854" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4139.json" } ], "title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container update", "tracking": { "current_release_date": "2024-11-13T22:06:58+00:00", "generator": { "date": "2024-11-13T22:06:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHBA-2020:4139", "initial_release_date": "2020-09-30T14:15:38+00:00", "revision_history": [ { "date": "2020-09-30T14:15:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-09-30T14:15:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:06:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.0", "product": { "name": "OpenShift Service Mesh 1.0", "product_id": "8Base-OSSM-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64", "product": { "name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64", "product_id": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64", "product_identification_helper": { "purl": "pkg:oci/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/3scale-istio-adapter-rhel8\u0026tag=1.0.0-9" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64 as a component of OpenShift Service Mesh 1.0", "product_id": "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64" }, "product_reference": "openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64", "relates_to_product_reference": "8Base-OSSM-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-09-30T14:15:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:4139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-09-30T14:15:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:4139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-1.0:openshift-service-mesh/3scale-istio-adapter-rhel8@sha256:744e2aa874312795ffb248721b1a0ad65bdaeee641e6f75e809106aec1cdb108_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2021_0713
Vulnerability from csaf_redhat
Published
2021-03-11 04:48
Modified
2024-11-13 22:19
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.5.34 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.5.34 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release also includes a security update for Red Hat OpenShift Container Platform 4.5.
Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.34. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2021:0714
All OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.5.34 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release also includes a security update for Red Hat OpenShift Container Platform 4.5.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.34. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2021:0714\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0713", "url": "https://access.redhat.com/errata/RHSA-2021:0713" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1934454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934454" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0713.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.34 packages and security update", "tracking": { "current_release_date": "2024-11-13T22:19:50+00:00", "generator": { "date": "2024-11-13T22:19:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0713", "initial_release_date": "2021-03-11T04:48:46+00:00", "revision_history": [ { "date": "2021-03-11T04:48:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-11T04:48:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:19:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "product": { "name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "product_id": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "product": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-4.el8.src", "product": { "name": "cri-tools-0:1.18.0-4.el8.src", "product_id": "cri-tools-0:1.18.0-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=src" } } }, { "category": "product_version", "name": "buildah-0:1.11.6-9.rhaos4.5.el8.src", "product": { "name": "buildah-0:1.11.6-9.rhaos4.5.el8.src", "product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "product": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=src" } } }, { "category": "product_version", "name": "apb-0:2.0.3-3.el7.src", "product": { "name": "apb-0:2.0.3-3.el7.src", "product_id": "apb-0:2.0.3-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "product": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-4.el7.src", "product": { "name": "cri-tools-0:1.18.0-4.el7.src", "product_id": "cri-tools-0:1.18.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "product": { "name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "product_id": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64", "product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "product": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-4.el8.x86_64", "product": { "name": "cri-tools-0:1.18.0-4.el8.x86_64", "product_id": "cri-tools-0:1.18.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "product": { "name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "product_id": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "product": { "name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "product": { "name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "product": { "name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "product": { "name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "apb-0:2.0.3-3.el7.x86_64", "product": { "name": "apb-0:2.0.3-3.el7.x86_64", "product_id": "apb-0:2.0.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "product": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-4.el7.x86_64", "product": { "name": "cri-tools-0:1.18.0-4.el7.x86_64", "product_id": "cri-tools-0:1.18.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "product": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-4.el8.ppc64le", "product": { "name": "cri-tools-0:1.18.0-4.el8.ppc64le", "product_id": "cri-tools-0:1.18.0-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "product": { "name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "product_id": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "apb-0:2.0.3-3.el7.ppc64le", "product": { "name": "apb-0:2.0.3-3.el7.ppc64le", "product_id": "apb-0:2.0.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "product": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-4.el7.ppc64le", "product": { "name": "cri-tools-0:1.18.0-4.el7.ppc64le", "product_id": "cri-tools-0:1.18.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "product": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "product": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "product": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "product_id": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-4.el8.s390x", "product": { "name": "cri-tools-0:1.18.0-4.el8.s390x", "product_id": "cri-tools-0:1.18.0-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x", "product": { "name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x", "product_id": "cri-tools-debugsource-0:1.18.0-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "product": { "name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "product_id": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "product": { "name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "product_id": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-9.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "product": { "name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "product_id": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-9.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "product": { "name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "product_id": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-9.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "product": { "name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "product_id": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-9.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "product_id": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-9.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "product": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-2.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "apb-0:2.0.3-3.el7.s390x", "product": { "name": "apb-0:2.0.3-3.el7.s390x", "product_id": "apb-0:2.0.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@2.0.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "product": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "product_id": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "product": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "product_id": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-7.rhaos4.5.git572d9f7.el7?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-4.el7.s390x", "product": { "name": "cri-tools-0:1.18.0-4.el7.s390x", "product_id": "cri-tools-0:1.18.0-4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-4.el7?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "product": { "name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "product_id": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-4.el7?arch=s390x" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "product_id": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-3.git642a960.el7?arch=s390x" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "product": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "product_id": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-3.git642a960.el7?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "product": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "product_id": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-2.rhaos4.5.el7?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-2.rhaos4.5.el7?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "product": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "product_id": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202102261511.p0.git.0.f0229b9.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:2.0.3-3.el7.noarch", "product": { "name": "apb-container-scripts-0:2.0.3-3.el7.noarch", "product_id": "apb-container-scripts-0:2.0.3-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb-container-scripts@2.0.3-3.el7?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:2.0.3-3.el7.noarch", "product": { "name": "apb-devel-0:2.0.3-3.el7.noarch", "product_id": "apb-devel-0:2.0.3-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb-devel@2.0.3-3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le" }, "product_reference": "apb-0:2.0.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-3.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x" }, "product_reference": "apb-0:2.0.3-3.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-3.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src" }, "product_reference": "apb-0:2.0.3-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64" }, "product_reference": "apb-0:2.0.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:2.0.3-3.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch" }, "product_reference": "apb-container-scripts-0:2.0.3-3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:2.0.3-3.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch" }, "product_reference": "apb-devel-0:2.0.3-3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le" }, "product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x" }, "product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src" }, "product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64" }, "product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x" }, "product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le" }, "product_reference": "cri-tools-0:1.18.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-4.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x" }, "product_reference": "cri-tools-0:1.18.0-4.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-4.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src" }, "product_reference": "cri-tools-0:1.18.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64" }, "product_reference": "cri-tools-0:1.18.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src" }, "product_reference": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x" }, "product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le" }, "product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x" }, "product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x" }, "product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-9.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src" }, "product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x" }, "product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x" }, "product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x" }, "product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le" }, "product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x" }, "product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src" }, "product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64" }, "product_reference": "cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le" }, "product_reference": "cri-tools-0:1.18.0-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x" }, "product_reference": "cri-tools-0:1.18.0-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-4.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src" }, "product_reference": "cri-tools-0:1.18.0-4.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64" }, "product_reference": "cri-tools-0:1.18.0-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le" }, "product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.18.0-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x" }, "product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64" }, "product_reference": "cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src" }, "product_reference": "openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64", "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-11T04:48:46+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64", "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64", "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64", "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-11T04:48:46+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64", "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.ppc64le", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.s390x", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.src", "7Server-RH7-RHOSE-4.5:apb-0:2.0.3-3.el7.x86_64", "7Server-RH7-RHOSE-4.5:apb-container-scripts-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:apb-devel-0:2.0.3-3.el7.noarch", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.s390x", "7Server-RH7-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.src", "7Server-RH7-RHOSE-4.5:cri-tools-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el7.x86_64", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.src", "7Server-RH7-RHOSE-4.5:golang-github-prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el7.x86_64", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.ppc64le", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.s390x", "7Server-RH7-RHOSE-4.5:prometheus-promu-0:0.5.0-3.git642a960.el7.x86_64", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.src", "8Base-RHOSE-4.5:buildah-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-debugsource-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:buildah-tests-debuginfo-0:1.11.6-9.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:containernetworking-plugins-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debuginfo-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containernetworking-plugins-debugsource-0:0.8.6-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-7.rhaos4.5.git572d9f7.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.src", "8Base-RHOSE-4.5:cri-tools-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debuginfo-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.ppc64le", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.s390x", "8Base-RHOSE-4.5:cri-tools-debugsource-0:1.18.0-4.el8.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202102261511.p0.git.0.f0229b9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhba-2020_5123
Vulnerability from csaf_redhat
Published
2020-12-02 16:36
Modified
2024-11-13 22:07
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.31 packages update
Notes
Topic
Red Hat OpenShift Container Platform release 4.4.31 is now available with updates to packages and images that fix several bugs.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.4.31. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2020:5122
All OpenShift Container Platform 4.4 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.4/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.4.31 is now available with updates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.4.31. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2020:5122\n\nAll OpenShift Container Platform 4.4 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2020:5123", "url": "https://access.redhat.com/errata/RHBA-2020:5123" }, { "category": "external", "summary": "1897975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897975" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_5123.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.31 packages update", "tracking": { "current_release_date": "2024-11-13T22:07:29+00:00", "generator": { "date": "2024-11-13T22:07:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHBA-2020:5123", "initial_release_date": "2020-12-02T16:36:58+00:00", "revision_history": [ { "date": "2020-12-02T16:36:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-12-02T16:36:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:07:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.4", "product": { "name": "Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.4::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.4", "product": { "name": "Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.4::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "iptables-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-arptables@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-devel@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-ebtables@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-libs@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-services-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-services@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-utils@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-debugsource@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-debuginfo@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-libs-debuginfo@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "product": { "name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "product_id": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables-utils-debuginfo@1.8.4-10.el8_2.4?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64", "product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "product": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=x86_64" } } }, { "category": "product_version", "name": "faq-0:0.0.6-5.el7.x86_64", "product": { "name": "faq-0:0.0.6-5.el7.x86_64", "product_id": "faq-0:0.0.6-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-5.el7.x86_64", "product": { "name": "faq-debuginfo-0:0.0.6-5.el7.x86_64", "product_id": "faq-debuginfo-0:0.0.6-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "product": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "iptables-0:1.8.4-10.el8_2.4.src", "product": { "name": "iptables-0:1.8.4-10.el8_2.4.src", "product_id": "iptables-0:1.8.4-10.el8_2.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/iptables@1.8.4-10.el8_2.4?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "product": { "name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "product_id": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.4.0-202011130111.p0.git.0.4861dfa.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "product": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el8?arch=src" } } }, { "category": "product_version", "name": "faq-0:0.0.6-5.el7.src", "product": { "name": "faq-0:0.0.6-5.el7.src", "product_id": "faq-0:0.0.6-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "product": { "name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "product_id": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "product": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src", "product": { "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src", "product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src", "product": { "name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src", "product_id": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "faq-0:0.0.6-5.el7.ppc64le", "product": { "name": "faq-0:0.0.6-5.el7.ppc64le", "product_id": "faq-0:0.0.6-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le", "product": { "name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le", "product_id": "faq-debuginfo-0:0.0.6-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "product": { "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "product": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "faq-0:0.0.6-5.el7.s390x", "product": { "name": "faq-0:0.0.6-5.el7.s390x", "product_id": "faq-0:0.0.6-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-5.el7.s390x", "product": { "name": "faq-debuginfo-0:0.0.6-5.el7.s390x", "product_id": "faq-debuginfo-0:0.0.6-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "product": { "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "product_id": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.4.0-202011130111.p0.git.0.4861dfa.el7?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "product": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "product_id": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.4.0-202011122017.p0.git.3445.6937a03.el7?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x", "product_id": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.4.0-202011122017.p0.git.15.d3ab88f.el7?arch=s390x" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "product": { "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "product_id": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.4.0-202011122017.p0.git.1806.53dc206.el7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "product": { "name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "product_id": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "product_id": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.4.0-202011122017.p0.git.0.2755c9b.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x" }, "product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le" }, "product_reference": "faq-0:0.0.6-5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x" }, "product_reference": "faq-0:0.0.6-5.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el7.src as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src" }, "product_reference": "faq-0:0.0.6-5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64" }, "product_reference": "faq-0:0.0.6-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le" }, "product_reference": "faq-debuginfo-0:0.0.6-5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x" }, "product_reference": "faq-debuginfo-0:0.0.6-5.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64" }, "product_reference": "faq-debuginfo-0:0.0.6-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src" }, "product_reference": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch" }, "product_reference": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src" }, "product_reference": "openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le" }, "product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x" }, "product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src" }, "product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64" }, "product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x" }, "product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-0:1.8.4-10.el8_2.4.src as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src" }, "product_reference": "iptables-0:1.8.4-10.el8_2.4.src", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-arptables-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-devel-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-libs-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-services-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-services-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-utils-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64" }, "product_reference": "iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src" }, "product_reference": "openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src" }, "product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64" }, "product_reference": "openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.4", "product_id": "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src", "7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src", "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src", "7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src", "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-02T16:36:58+00:00", "details": "For OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:5123" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src", "7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src", "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.src", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-enterprise-service-catalog-svcat-1:4.4.0-202011122017.p0.git.1806.53dc206.el7.x86_64", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.ppc64le", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.s390x", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.src", "7Server-RH7-RHOSE-4.4:atomic-openshift-service-idler-0:4.4.0-202011122017.p0.git.15.d3ab88f.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "7Server-RH7-RHOSE-4.4:openshift-ansible-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.src", "7Server-RH7-RHOSE-4.4:openshift-ansible-test-0:4.4.0-202011122017.p0.git.0.2755c9b.el7.noarch", "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.src", "8Base-RHOSE-4.4:iptables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-arptables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-debugsource-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-devel-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-ebtables-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-libs-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-libs-debuginfo-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-services-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-utils-0:1.8.4-10.el8_2.4.x86_64", "8Base-RHOSE-4.4:iptables-utils-debuginfo-0:1.8.4-10.el8_2.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-02T16:36:58+00:00", "details": "For OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:5123" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.4:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.4:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.src", "7Server-RH7-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el7.x86_64", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.ppc64le", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.s390x", "7Server-RH7-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el7.x86_64", "8Base-RHOSE-4.4:openshift-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.src", "8Base-RHOSE-4.4:openshift-clients-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-clients-redistributable-0:4.4.0-202011122017.p0.git.3445.6937a03.el8.x86_64", "8Base-RHOSE-4.4:openshift-hyperkube-0:4.4.0-202011130111.p0.git.0.4861dfa.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_5119
Vulnerability from csaf_redhat
Published
2020-11-24 11:57
Modified
2024-11-13 22:17
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.5.20 packages and golang security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.
This release also includes a security update for golang for Red Hat OpenShift Container Platform 4.5.20.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
Security Fix(es):
* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.20. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2020:5118
All OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.[y]/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.5.20 is now available with updates to packages and images that fix several bugs.\n\nThis release also includes a security update for golang for Red Hat OpenShift Container Platform 4.5.20.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nSecurity Fix(es):\n\n* golang: Data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.5.20. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5118\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.[y]/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5119", "url": "https://access.redhat.com/errata/RHSA-2020:5119" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1897972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897972" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5119.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.20 packages and golang security update", "tracking": { "current_release_date": "2024-11-13T22:17:11+00:00", "generator": { "date": "2024-11-13T22:17:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2020:5119", "initial_release_date": "2020-11-24T11:57:51+00:00", "revision_history": [ { "date": "2020-11-24T11:57:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-24T11:57:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:17:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "faq-0:0.0.6-5.el7.ppc64le", "product": { "name": "faq-0:0.0.6-5.el7.ppc64le", "product_id": "faq-0:0.0.6-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le", "product": { "name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le", "product_id": "faq-debuginfo-0:0.0.6-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le", "product": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le", "product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "product": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le", "product": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le", "product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "product": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le", "product": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le", "product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "faq-0:0.0.6-5.el7.s390x", "product": { "name": "faq-0:0.0.6-5.el7.s390x", "product_id": "faq-0:0.0.6-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-5.el7.s390x", "product": { "name": "faq-debuginfo-0:0.0.6-5.el7.s390x", "product_id": "faq-debuginfo-0:0.0.6-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x", "product": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x", "product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "product": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "product": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x", "product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x", "product": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x", "product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=s390x" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "product": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x", "product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "product": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x", "product": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x", "product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "faq-0:0.0.6-5.el7.x86_64", "product": { "name": "faq-0:0.0.6-5.el7.x86_64", "product_id": "faq-0:0.0.6-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-5.el7.x86_64", "product": { "name": "faq-debuginfo-0:0.0.6-5.el7.x86_64", "product_id": "faq-debuginfo-0:0.0.6-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64", "product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "product": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "product": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64", "product_id": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "product": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "product_id": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.18.4-4.rhaos4.5.git6dee389.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "product": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "faq-0:0.0.6-5.el7.src", "product": { "name": "faq-0:0.0.6-5.el7.src", "product_id": "faq-0:0.0.6-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src", "product": { "name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src", "product_id": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.5.0-202011131403.p0.git.0.d153f8f.el7?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "product": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src", "product": { "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src", "product_id": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.5.0-202011121956.p0.git.15.cccc412.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src", "product": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src", "product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.5.0-202011121956.p0.git.1808.0eb4933.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src", "product": { "name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src", "product_id": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src", "product": { "name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src", "product_id": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.5.0-202011131403.p0.git.0.d153f8f.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "product": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "product_id": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.18.4-4.rhaos4.5.git6dee389.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src", "product": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src", "product_id": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.5.0-202011121956.p0.git.3609.b4952c1.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "product": { "name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "product_id": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "product_id": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.5.0-202011121956.p0.git.0.7093c82.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x" }, "product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le" }, "product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x" }, "product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src" }, "product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64" }, "product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x" }, "product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le" }, "product_reference": "faq-0:0.0.6-5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x" }, "product_reference": "faq-0:0.0.6-5.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src" }, "product_reference": "faq-0:0.0.6-5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64" }, "product_reference": "faq-0:0.0.6-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le" }, "product_reference": "faq-debuginfo-0:0.0.6-5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-5.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x" }, "product_reference": "faq-debuginfo-0:0.0.6-5.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64" }, "product_reference": "faq-debuginfo-0:0.0.6-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src" }, "product_reference": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch" }, "product_reference": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src" }, "product_reference": "openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le" }, "product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x" }, "product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src" }, "product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64" }, "product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x" }, "product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le" }, "product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x" }, "product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src" }, "product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64" }, "product_reference": "cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src" }, "product_reference": "openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x" }, "product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src" }, "product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64" }, "product_reference": "openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-24T11:57:51+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5119" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.src", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-enterprise-service-catalog-svcat-1:4.5.0-202011121956.p0.git.1808.0eb4933.el7.x86_64", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.ppc64le", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.s390x", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.src", "7Server-RH7-RHOSE-4.5:atomic-openshift-service-idler-0:4.5.0-202011121956.p0.git.15.cccc412.el7.x86_64", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.src", "7Server-RH7-RHOSE-4.5:faq-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.ppc64le", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.s390x", "7Server-RH7-RHOSE-4.5:faq-debuginfo-0:0.0.6-5.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-ansible-0:4.5.0-202011121956.p0.git.0.7093c82.el7.src", "7Server-RH7-RHOSE-4.5:openshift-ansible-test-0:4.5.0-202011121956.p0.git.0.7093c82.el7.noarch", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.src", "7Server-RH7-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el7.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.ppc64le", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.s390x", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.src", "8Base-RHOSE-4.5:openshift-clients-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "8Base-RHOSE-4.5:openshift-clients-redistributable-0:4.5.0-202011121956.p0.git.3609.b4952c1.el8.x86_64", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202011131403.p0.git.0.d153f8f.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-24T11:57:51+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5119" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.src", "7Server-RH7-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.ppc64le", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.s390x", "7Server-RH7-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el7.x86_64", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.src", "8Base-RHOSE-4.5:cri-o-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debuginfo-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.ppc64le", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.s390x", "8Base-RHOSE-4.5:cri-o-debugsource-0:1.18.4-4.rhaos4.5.git6dee389.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhba-2021_0101
Vulnerability from csaf_redhat
Published
2021-01-13 15:41
Modified
2024-11-13 22:06
Summary
Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.20.2 Operator/Operand Containers
Notes
Topic
Red Hat OpenShift Jaeger 1.20.2.
Details
Release of Red Hat OpenShift Jaeger provides these changes:
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Jaeger 1.20.2.", "title": "Topic" }, { "category": "general", "text": "Release of Red Hat OpenShift Jaeger provides these changes:", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2021:0101", "url": "https://access.redhat.com/errata/RHBA-2021:0101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0101.json" } ], "title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.20.2 Operator/Operand Containers", "tracking": { "current_release_date": "2024-11-13T22:06:33+00:00", "generator": { "date": "2024-11-13T22:06:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHBA-2021:0101", "initial_release_date": "2021-01-13T15:41:50+00:00", "revision_history": [ { "date": "2021-01-13T15:41:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-13T15:41:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:06:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Jaeger 1.20", "product": { "name": "Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20", "product_identification_helper": { "cpe": "cpe:/a:redhat:jaeger:1.20::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Jaeger" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "product": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.2-2" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.2-2" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "product": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.2-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "product": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.2-2" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "product": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.2-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "product": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.2-2" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "product": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "product_id": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.2-2" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64", "product": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64", "product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.2-2" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64" }, "product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64" }, "product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64" }, "product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64" }, "product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64" }, "product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64" }, "product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-13T15:41:50+00:00", "details": "Red Hat OpenShift Jaeger Release", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:0101" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-13T15:41:50+00:00", "details": "Red Hat OpenShift Jaeger Release", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:0101" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:4fd12fd4195fbe7c834065241f0bc925b646aed9308d1714e32b92799cebdd3e_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2b61d7c37f71b6d9ae0d41bd26eb6ec58ebc56cb8659ffc20d152c8906814cca_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f0732fd98255b246ee80461e40976571d489f7f0a4697db4dccdf103a95eefee_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4bfa95cbb4416335bf1eb3ed63d6ab8b4ddf1bec3365d3cadf1b58ef093ad691_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:98a27286a18d68485c08f719bc4303153e97ac44f2719e5974c0a003388257ff_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:8aac2e131725953c3747a1d8bec9ef75071a6ae995cf9bd481a1f2e36c791b0d_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:92e1aea91dbdfad53e42f8774b6cfd23fd4149e2c1579e536e9c8a502abb395f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a03717b0dff471054adbb81c2fdb3c7e804f20d48353c4c1cdd5bf4ec30a50cf_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_3665
Vulnerability from csaf_redhat
Published
2020-09-08 10:05
Modified
2024-11-24 20:21
Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3665", "url": "https://access.redhat.com/errata/RHSA-2020:3665" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3665.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security update", "tracking": { "current_release_date": "2024-11-24T20:21:52+00:00", "generator": { "date": "2024-11-24T20:21:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:3665", "initial_release_date": "2020-09-08T10:05:46+00:00", "revision_history": [ { "date": "2020-09-08T10:05:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-09-08T10:05:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:21:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8020020200817154239:02f7cb7a", "product": { "name": "go-toolset:rhel8:8020020200817154239:02f7cb7a", "product_id": "go-toolset:rhel8:8020020200817154239:02f7cb7a", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8020020200817154239:02f7cb7a" } } }, { "category": "product_version", "name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product": { "name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_id": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product": { "name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_id": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product": { "name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_id": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product": { "name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_id": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "product": { "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=src" } } }, { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product": { "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_id": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product": { "name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_id": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product": { "name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_id": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.3.2-3.module%2Bel8.2.0%2B5581%2B896cb53e?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product": { "name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_id": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_id": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_id": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_id": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.13.15-1.module%2Bel8.2.0%2B7662%2Bfa98b974?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, "product_reference": "go-toolset:rhel8:8020020200817154239:02f7cb7a", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src" }, "product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64" }, "product_reference": "delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64" }, "product_reference": "delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64" }, "product_reference": "delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64" }, "product_reference": "go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64" }, "product_reference": "golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64" }, "product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le" }, "product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x" }, "product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64" }, "product_reference": "golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" }, "product_reference": "golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" }, "product_reference": "golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64 as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64" }, "product_reference": "golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" }, "product_reference": "golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch as a component of go-toolset:rhel8:8020020200817154239:02f7cb7a as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" }, "product_reference": "golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-09-08T10:05:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3665" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-09-08T10:05:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3665" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-09-08T10:05:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3665" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debuginfo-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:delve-debugsource-0:1.3.2-3.module+el8.2.0+5581+896cb53e.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:go-toolset-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.src", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.s390x", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-bin-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-docs-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-misc-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-race-0:1.13.15-1.module+el8.2.0+7662+fa98b974.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-src-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch", "AppStream-8.2.0.Z.MAIN.EUS:go-toolset:rhel8:8020020200817154239:02f7cb7a:golang-tests-0:1.13.15-1.module+el8.2.0+7662+fa98b974.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhba-2020_5356
Vulnerability from csaf_redhat
Published
2020-12-15 19:37
Modified
2024-11-13 22:07
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.23 packages update
Notes
Topic
Red Hat OpenShift Container Platform release 4.5.23 is now available with
updates to packages and images that fix several bugs.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.5.23. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHSA-2020:5359
All OpenShift Container Platform 4.5 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.5.23 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.23. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5359\n\nAll OpenShift Container Platform 4.5 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2020:5356", "url": "https://access.redhat.com/errata/RHBA-2020:5356" }, { "category": "external", "summary": "1905005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905005" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_5356.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.23 packages update", "tracking": { "current_release_date": "2024-11-13T22:07:43+00:00", "generator": { "date": "2024-11-13T22:07:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHBA-2020:5356", "initial_release_date": "2020-12-15T19:37:22+00:00", "revision_history": [ { "date": "2020-12-15T19:37:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-12-15T19:37:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:07:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src", "product": { "name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src", "product_id": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=src" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "product": { "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src", "product": { "name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src", "product_id": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src", "product": { "name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src", "product_id": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le", "product": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le", "product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "product": { "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x", "product": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x", "product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=s390x" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "product": { "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x", "product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64", "product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el7?arch=x86_64" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64", "product": { "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64", "product_id": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.5.0-202012050338.p0.git.2581.e7a62a7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64", "product_id": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.5.0-202012040353.p0.git.0.c2c4083.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product_id": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.5.0-202012022006.p0.git.2002.19b85d0.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src" }, "product_reference": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x" }, "product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le" }, "product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x" }, "product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src" }, "product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64" }, "product_reference": "machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src" }, "product_reference": "openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src" }, "product_reference": "openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64", "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src", "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64", "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src", "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-15T19:37:22+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:5356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64", "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src", "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.src", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el7.x86_64", "8Base-RHOSE-4.5:openshift-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.src", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.ppc64le", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.s390x", "8Base-RHOSE-4.5:openshift-hyperkube-0:4.5.0-202012040353.p0.git.0.c2c4083.el8.x86_64", "8Base-RHOSE-4.5:openshift-kuryr-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.src", "8Base-RHOSE-4.5:openshift-kuryr-cni-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-common-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:openshift-kuryr-controller-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch", "8Base-RHOSE-4.5:python3-kuryr-kubernetes-0:4.5.0-202012022006.p0.git.2002.19b85d0.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-15T19:37:22+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:5356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.ppc64le", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.s390x", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.src", "8Base-RHOSE-4.5:machine-config-daemon-0:4.5.0-202012050338.p0.git.2581.e7a62a7.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_4297
Vulnerability from csaf_redhat
Published
2020-10-27 14:53
Modified
2024-11-24 20:21
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.6.1 package security update
Notes
Topic
An update for jenkins-2-plugins, openshift-clients, podman, runc, and skopeo is now available for Red Hat OpenShift Container Platform 4.6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* jenkins-jira-plugin: plugin information disclosure (CVE-2019-16541)
* jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM (CVE-2020-2252)
* jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files (CVE-2020-2254)
* jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests. (CVE-2020-2255)
* kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 (CVE-2020-8564)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for jenkins-2-plugins, openshift-clients, podman, runc, and skopeo is now available for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nThe runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.\n\nThe skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* jenkins-jira-plugin: plugin information disclosure (CVE-2019-16541)\n\n* jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM (CVE-2020-2252)\n\n* jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files (CVE-2020-2254)\n\n* jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests. (CVE-2020-2255)\n\n* kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4 (CVE-2020-8564)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4297", "url": "https://access.redhat.com/errata/RHSA-2020:4297" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1819663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1874268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268" }, { "category": "external", "summary": "1880454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454" }, { "category": "external", "summary": "1880456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456" }, { "category": "external", "summary": "1880460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460" }, { "category": "external", "summary": "1886637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4297.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.1 package security update", "tracking": { "current_release_date": "2024-11-24T20:21:47+00:00", "generator": { "date": "2024-11-24T20:21:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4297", "initial_release_date": "2020-10-27T14:53:57+00:00", "revision_history": [ { "date": "2020-10-27T14:53:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-27T14:53:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:21:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "product": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_id": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.6.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "podman-0:1.9.3-3.rhaos4.6.el8.src", "product": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.src", "product_id": "podman-0:1.9.3-3.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-3.rhaos4.6.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src", "product_id": "skopeo-1:1.1.1-2.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.6.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el8?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "product": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "product_id": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202010081244.p0.git.3794.4743d24.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "product": { "name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "product_id": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@1.9.3-3.rhaos4.6.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src" }, "product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch" }, "product_reference": "podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le" }, "product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x" }, "product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" }, "product_reference": "podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le" }, "product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x" }, "product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" }, "product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16541", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2019-11-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819663" } ], "notes": [ { "category": "description", "text": "Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-jira-plugin: plugin information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16541" }, { "category": "external", "summary": "RHBZ#1819663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16541", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16541" }, { "category": "external", "summary": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106", "url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:53:57+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-jira-plugin: plugin information disclosure" }, { "cve": "CVE-2020-2252", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2020-09-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1880454" } ], "notes": [ { "category": "description", "text": "Jenkins Mailer Plugin 1.32 and earlier does not perform hostname validation when connecting to the configured SMTP server.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2252" }, { "category": "external", "summary": "RHBZ#1880454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2252", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2252" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813", "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3", "url": "https://www.openwall.com/lists/oss-security/2020/09/16/3" } ], "release_date": "2020-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:53:57+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM" }, { "cve": "CVE-2020-2254", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1880456" } ], "notes": [ { "category": "description", "text": "Jenkins Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag that, when enabled, allows an attacker with Job/Configure or Job/Create permission to read arbitrary files on the Jenkins controller file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2254" }, { "category": "external", "summary": "RHBZ#1880456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2254", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2254" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956", "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956" } ], "release_date": "2020-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:53:57+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files" }, { "cve": "CVE-2020-2255", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2020-09-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1880460" } ], "notes": [ { "category": "description", "text": "A missing permission check in Jenkins Blue Ocean Plugin 1.23.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2255" }, { "category": "external", "summary": "RHBZ#1880460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880460" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2255", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2255" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2255" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961", "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/09/16/3", "url": "https://www.openwall.com/lists/oss-security/2020/09/16/3" } ], "release_date": "2020-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:53:57+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests." }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Nikolaos Moraitis" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8564", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886637" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This can occur with client tools like `kubectl`, or other components that use registry credentials in a docker config file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8564" }, { "category": "external", "summary": "RHBZ#1886637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886637" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8564", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8564" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95622", "url": "https://github.com/kubernetes/kubernetes/issues/95622" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:53:57+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:53:57+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-14370", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-07-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874268" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in containers/podman. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container leak into subsequent containers. This flaw allows an attacker who controls the subsequent containers to gain access to sensitive information stored in such variables. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst OpenShift Container Platform (OCP) does include podman, the Varlink API is not enabled by default. However, as it is trivial to activate this feature, OCP has been marked as affected.\n\nOCP 3.11 has previously packaged podman, but instead now relies on the version from rhel-extra.The older version previously packaged is not vulnerable to this CVE and hence has been marked not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14370" }, { "category": "external", "summary": "RHBZ#1874268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14370", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370" } ], "release_date": "2020-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:53:57+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:53:57+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:containers-common-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-2-plugins-0:4.6.1601368321-1.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:skopeo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debuginfo-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-debugsource-1:1.1.1-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:skopeo-tests-1:1.1.1-2.rhaos4.6.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:53:57+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4297" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.src", "7Server-RH7-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "7Server-RH7-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el7.x86_64", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202010081244.p0.git.3794.4743d24.el8.x86_64", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:podman-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-debugsource-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-docker-0:1.9.3-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-remote-debuginfo-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:podman-tests-0:1.9.3-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2021_0072
Vulnerability from csaf_redhat
Published
2021-01-11 21:59
Modified
2024-11-13 22:18
Summary
Red Hat Security Advisory: OpenShift Serverless 1.9.0 release and security update
Notes
Topic
OpenShift Serverless 1.9.0 release and security update is now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Serverless 1.9.0 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform version 4.5.
Security Fix(es):
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "OpenShift Serverless 1.9.0 release and security update is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless 1.9.0 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform version 4.5.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0072", "url": "https://access.redhat.com/errata/RHSA-2021:0072" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0072.json" } ], "title": "Red Hat Security Advisory: OpenShift Serverless 1.9.0 release and security update", "tracking": { "current_release_date": "2024-11-13T22:18:01+00:00", "generator": { "date": "2024-11-13T22:18:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0072", "initial_release_date": "2021-01-11T21:59:01+00:00", "revision_history": [ { "date": "2021-01-11T21:59:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-11T21:59:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:18:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Serverless 1.9.0", "product": { "name": "OpenShift Serverless 1.9.0", "product_id": "OpenShift Serverless 1.9.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "OpenShift Serverless 1.9.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-11T21:59:01+00:00", "details": "See the documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index", "product_ids": [ "OpenShift Serverless 1.9.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0072" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "OpenShift Serverless 1.9.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "OpenShift Serverless 1.9.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-11T21:59:01+00:00", "details": "See the documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index", "product_ids": [ "OpenShift Serverless 1.9.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0072" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "OpenShift Serverless 1.9.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_4214
Vulnerability from csaf_redhat
Published
2020-10-08 10:52
Modified
2024-11-24 20:21
Summary
Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update
Notes
Topic
An update for go-toolset-1.13 and go-toolset-1.13-golang is now available for Red Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* net/http, x/net/http2: http server shutdown doesn't gracefully shut down HTTP2 connections (BZ#1879236)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.13 and go-toolset-1.13-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* net/http, x/net/http2: http server shutdown doesn\u0027t gracefully shut down HTTP2 connections (BZ#1879236)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4214", "url": "https://access.redhat.com/errata/RHSA-2020:4214" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/", "url": "https://access.redhat.com/documentation/en-us/red_hat_developer_tools/1/html/using_go_1.13_toolset/" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4214.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update", "tracking": { "current_release_date": "2024-11-24T20:21:33+00:00", "generator": { "date": "2024-11-24T20:21:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4214", "initial_release_date": "2020-10-08T10:52:13+00:00", "revision_history": [ { "date": "2020-10-08T10:52:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-08T10:52:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:21:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2020" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2020" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "product": { "name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "product_id": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "product": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "product": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-race@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "product": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-0:1.13.15-1.el7.src", "product": { "name": "go-toolset-1.13-0:1.13.15-1.el7.src", "product_id": "go-toolset-1.13-0:1.13.15-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=src" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "product": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "product": { "name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "product_id": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "product": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "product": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "product": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "product": { "name": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "product_id": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13@1.13.15-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "product": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "product_id": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-build@1.13.15-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "product": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "product_id": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-runtime@1.13.15-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang@1.13.15-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-bin@1.13.15-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-misc@1.13.15-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-src@1.13.15-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "product": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "product_id": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-tests@1.13.15-3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "product": { "name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "product_id": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.13-golang-docs@1.13.15-3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch" }, "product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch" }, "product_reference": "go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64" }, "product_reference": "go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2020.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" }, "product_reference": "go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2020.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-08T10:52:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4214" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-08T10:52:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4214" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-08T10:52:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4214" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Server-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Server-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-build-0:1.13.15-1.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.src", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-bin-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-docs-0:1.13.15-3.el7.noarch", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-misc-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-race-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-src-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-golang-tests-0:1.13.15-3.el7.x86_64", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.ppc64le", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.s390x", "7Workstation-DevTools-2020.2:go-toolset-1.13-runtime-0:1.13.15-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2021_0956
Vulnerability from csaf_redhat
Published
2021-03-30 16:48
Modified
2024-11-13 22:20
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.6.23 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.6.23 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
ed Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.6.23. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2021:0952
All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
-between-minor.html#understanding-upgrade-channels_updating-cluster-between
-minor.
Security Fix(es):
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.6.23 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "ed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.23. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:0952\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0956", "url": "https://access.redhat.com/errata/RHSA-2021:0956" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1941433", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941433" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0956.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.23 security update", "tracking": { "current_release_date": "2024-11-13T22:20:51+00:00", "generator": { "date": "2024-11-13T22:20:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:0956", "initial_release_date": "2021-03-30T16:48:30+00:00", "revision_history": [ { "date": "2021-03-30T16:48:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-30T16:48:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:20:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "product": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "product": { "name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "product_id": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "product": { "name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "product_id": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "product": { "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "product": { "name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "product_id": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202103210832.p0.git.94284.834ccc7.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "product": { "name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "product_id": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "product": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64", "product": { "name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64", "product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202103200039.p0.git.3841.3e951a5.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "product": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "product": { "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "product": { "name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "product": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "product_id": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202103200039.p0.git.3841.3e951a5.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "product_id": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202103210832.p0.git.94284.834ccc7.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "product": { "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "product_id": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-6.git7c289cc.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "product": { "name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "product_id": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-6.git7c289cc.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "product_id": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-6.git7c289cc.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product_id": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202103192141.p0.git.2234.cba9525.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "product": { "name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "product_id": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "product_id": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202103192141.p0.git.0.d1b612b.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src" }, "product_reference": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch" }, "product_reference": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src" }, "product_reference": "openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src" }, "product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src" }, "product_reference": "openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x" }, "product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src" }, "product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le" }, "product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x" }, "product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src" }, "product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le" }, "product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x" }, "product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" }, "product_reference": "openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src" }, "product_reference": "openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-30T16:48:30+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-30T16:48:30+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1897635" } ], "notes": [ { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202103192141.p0.git.0.d1b612b.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202103200039.p0.git.3841.3e951a5.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202103210832.p0.git.94284.834ccc7.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202103192141.p0.git.2234.cba9525.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "RHBZ#1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-30T16:48:30+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0956" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-6.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-6.git7c289cc.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: panic during recursive division of very large numbers" } ] }
rhsa-2020_5606
Vulnerability from csaf_redhat
Published
2020-12-17 05:43
Modified
2024-11-24 20:22
Summary
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6 bug fix and enhancement update
Notes
Topic
An update for mcg is now available for Red Hat OpenShift Container Storage 4.6.0 on RHEL-8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
These updated packages include numerous security fixes, bug fixes, and
enhancements.
Security Fix(es):
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
These updated packages include numerous bug fixes and enhancements. Users are
directed to the Red Hat OpenShift Container Storage Release Notes for
information on the most significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index
All Red Hat OpenShift Container Storage users are advised to upgrade to these
updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mcg is now available for Red Hat OpenShift Container Storage 4.6.0 on RHEL-8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated packages include numerous security fixes, bug fixes, and\nenhancements.\n\nSecurity Fix(es):\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese updated packages include numerous bug fixes and enhancements. Users are\ndirected to the Red Hat OpenShift Container Storage Release Notes for\ninformation on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to these\nupdated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5606", "url": "https://access.redhat.com/errata/RHSA-2020:5606" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5606.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6 bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-24T20:22:05+00:00", "generator": { "date": "2024-11-24T20:22:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:5606", "initial_release_date": "2020-12-17T05:43:57+00:00", "revision_history": [ { "date": "2020-12-17T05:43:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-12-17T05:43:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:22:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product": { "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Storage" }, { "branches": [ { "category": "product_version", "name": "tini-0:0.18.0-5.el8.src", "product": { "name": "tini-0:0.18.0-5.el8.src", "product_id": "tini-0:0.18.0-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=src" } } }, { "category": "product_version", "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src", "product": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src", "product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tini-0:0.18.0-5.el8.x86_64", "product": { "name": "tini-0:0.18.0-5.el8.x86_64", "product_id": "tini-0:0.18.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64", "product": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64", "product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tini-0:0.18.0-5.el8.s390x", "product": { "name": "tini-0:0.18.0-5.el8.s390x", "product_id": "tini-0:0.18.0-5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=s390x" } } }, { "category": "product_version", "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "product": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tini-0:0.18.0-5.el8.ppc64le", "product": { "name": "tini-0:0.18.0-5.el8.ppc64le", "product_id": "tini-0:0.18.0-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.18.0-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "product": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "product_id": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.6.0-39.2279a46.5.6.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le" }, "product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x" }, "product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src" }, "product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.src", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" }, "product_reference": "mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.18.0-5.el8.ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le" }, "product_reference": "tini-0:0.18.0-5.el8.ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.18.0-5.el8.s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x" }, "product_reference": "tini-0:0.18.0-5.el8.s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.18.0-5.el8.src as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src" }, "product_reference": "tini-0:0.18.0-5.el8.src", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.18.0-5.el8.x86_64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" }, "product_reference": "tini-0:0.18.0-5.el8.x86_64", "relates_to_product_reference": "8Base-RH-OCS-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "known_not_affected": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-17T05:43:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5606" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "known_not_affected": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-17T05:43:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5606" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "known_not_affected": [ "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.ppc64le", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.s390x", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.src", "8Base-RH-OCS-4.6:tini-0:0.18.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-17T05:43:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5606" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.ppc64le", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.s390x", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.src", "8Base-RH-OCS-4.6:mcg-0:5.6.0-39.2279a46.5.6.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2020_5605
Vulnerability from csaf_redhat
Published
2020-12-17 19:42
Modified
2024-11-24 20:21
Summary
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement update
Notes
Topic
Updated images are now available for Red Hat OpenShift Container Storage 4.6.0 on Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
These updated images include numerous security fixes, bug fixes, and enhancements.
Security Fix(es):
* nodejs-node-forge: prototype pollution via the util.setPath function (CVE-2020-7720)
* nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS (CVE-2020-8237)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Users are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index
All Red Hat OpenShift Container Storage users are advised to upgrade to
these updated images.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images are now available for Red Hat OpenShift Container Storage 4.6.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThese updated images include numerous security fixes, bug fixes, and enhancements. \n\nSecurity Fix(es):\n\n* nodejs-node-forge: prototype pollution via the util.setPath function (CVE-2020-7720)\n\n* nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS (CVE-2020-8237)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUsers are directed to the Red Hat OpenShift Container Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_container_storage/4.6/html/4.6_release_notes/index\n\nAll Red Hat OpenShift Container Storage users are advised to upgrade to\nthese updated images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5605", "url": "https://access.redhat.com/errata/RHSA-2020:5605" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1806266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806266" }, { "category": "external", "summary": "1813506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813506" }, { "category": "external", "summary": "1817438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817438" }, { "category": "external", "summary": "1817850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817850" }, { "category": "external", "summary": "1827157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827157" }, { "category": "external", "summary": "1829055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1829055" }, { "category": "external", "summary": "1833153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833153" }, { "category": "external", "summary": "1836299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836299" }, { "category": "external", "summary": "1842254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842254" }, { "category": "external", "summary": "1845976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845976" }, { "category": "external", "summary": "1849771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849771" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1854500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854500" }, { "category": "external", "summary": "1854501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854501" }, { "category": "external", "summary": "1854503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854503" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1858195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858195" }, { "category": "external", "summary": "1859183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859183" }, { "category": "external", "summary": "1859229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859229" }, { "category": "external", "summary": "1859478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859478" }, { "category": "external", "summary": "1860022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860022" }, { "category": "external", "summary": "1860034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860034" }, { "category": "external", "summary": "1860670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860670" }, { "category": "external", "summary": "1860848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860848" }, { "category": "external", "summary": "1861780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861780" }, { "category": "external", "summary": "1865938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865938" }, { "category": "external", "summary": "1867024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867024" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1868060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868060" }, { "category": "external", "summary": "1868703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868703" }, { "category": "external", "summary": "1869411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869411" }, { "category": "external", "summary": "1870061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870061" }, { "category": "external", "summary": "1870338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870338" }, { "category": "external", "summary": "1870631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870631" }, { "category": "external", "summary": "1872119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872119" }, { "category": "external", "summary": "1872696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872696" }, { "category": "external", "summary": "1873864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873864" }, { "category": "external", "summary": "1874606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606" }, { "category": "external", "summary": "1875476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875476" }, { "category": "external", "summary": "1877339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877339" }, { "category": "external", "summary": "1877371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877371" }, { "category": "external", "summary": "1878153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878153" }, { "category": "external", "summary": "1878714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878714" }, { "category": "external", "summary": "1878853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878853" }, { "category": "external", "summary": "1879008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879008" }, { "category": "external", "summary": "1879072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879072" }, { "category": "external", "summary": "1879919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879919" }, { "category": "external", "summary": "1880255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880255" }, { "category": "external", "summary": "1881028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028" }, { "category": "external", "summary": "1881071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881071" }, { "category": "external", "summary": "1882397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882397" }, { "category": "external", "summary": "1883253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883253" }, { "category": "external", "summary": "1883398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883398" }, { "category": "external", "summary": "1883767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883767" }, { "category": "external", "summary": "1883810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883810" }, { "category": "external", "summary": "1883927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883927" }, { "category": "external", "summary": "1885175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885175" }, { "category": "external", "summary": "1885428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885428" }, { "category": "external", "summary": "1885648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885648" }, { "category": "external", "summary": "1885971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885971" }, { "category": "external", "summary": "1886308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886308" }, { "category": "external", "summary": "1886348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886348" }, { "category": "external", "summary": "1886551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886551" }, { "category": "external", "summary": "1886709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886709" }, { "category": "external", "summary": "1886859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886859" }, { "category": "external", "summary": "1886873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886873" }, { "category": "external", "summary": "1888583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888583" }, { "category": "external", "summary": "1888593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888593" }, { "category": "external", "summary": "1888614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888614" }, { "category": "external", "summary": "1889441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889441" }, { "category": "external", "summary": "1889683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889683" }, { "category": "external", "summary": "1889866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889866" }, { "category": "external", "summary": "1890183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890183" }, { "category": "external", "summary": "1890638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890638" }, { "category": "external", "summary": "1890971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890971" }, { "category": "external", "summary": "1891856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891856" }, { "category": "external", "summary": "1892206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892206" }, { "category": "external", "summary": "1892234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892234" }, { "category": "external", "summary": "1893624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893624" }, { "category": "external", "summary": "1893691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893691" }, { "category": "external", "summary": "1893714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893714" }, { "category": "external", "summary": "1895402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895402" }, { "category": "external", "summary": "1896298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896298" }, { "category": "external", "summary": "1896831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896831" }, { "category": "external", "summary": "1898521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898521" }, { "category": "external", "summary": "1902627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902627" }, { "category": "external", "summary": "1904171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904171" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5605.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement update", "tracking": { "current_release_date": "2024-11-24T20:21:58+00:00", "generator": { "date": "2024-11-24T20:21:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:5605", "initial_release_date": "2020-12-17T19:42:16+00:00", "revision_history": [ { "date": "2020-12-17T19:42:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-12-17T19:42:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:21:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product": { "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Storage" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "product": { "name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "product_id": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "product": { "name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "product_id": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "product_id": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "product": { "name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "product_id": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "product_id": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "product": { "name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "product_id": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "product": { "name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "product_id": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "product_id": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "product": { "name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "product_id": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "product_id": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "product": { "name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "product_id": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-52.49cf5efdd.release_4.6" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "product": { "name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "product_id": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-38.31e0c3c7b.5.6" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "product_id": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-39.2279a46.5.6" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "product": { "name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "product_id": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.0-7" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "product_id": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-76.0811c33c.release_4.6" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-80.1ae5ac6a.release_4.6" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7720", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-09-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874606" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-node-forge. A Prototype Pollution via the util.setPath function is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-node-forge: prototype pollution via the util.setPath function", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of node-forge as a dependency of google-p12-pem, however the vulnerable function `util.setPath` is not being used and hence this issue has been rated as having a security impact of Low.\n\nIn OpenShift Container Platform (OCP) the prometheus container is behind OpenShift OAuth restricting access to the vulnerable node-forge library to authenticated users only, therefore the impact is Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7720" }, { "category": "external", "summary": "RHBZ#1874606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7720", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7720" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677", "url": "https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677" } ], "release_date": "2020-09-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-17T19:42:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-node-forge: prototype pollution via the util.setPath function" }, { "cve": "CVE-2020-8237", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-09-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881028" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-json-bigint. A Prototype pollution in json-bigint npm may lead to a denial-of-service (DoS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Openshift Container Storage 4 the noobaa-core container includes the affected version of json-bigint as a dependency of googleapis, however the json-bigint library is not being used and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8237" }, { "category": "external", "summary": "RHBZ#1881028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8237", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8237" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8237" }, { "category": "external", "summary": "https://hackerone.com/reports/916430", "url": "https://hackerone.com/reports/916430" } ], "release_date": "2020-08-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-17T19:42:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-17T19:42:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-17T19:42:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:228facfd8d353ab64a8752579b3f9a6fd0cc00b684a48de8ba4a93a41f12ae25_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:6c553f9b1826b20d599a85e336cc37ab7ea968016421f387b50f3fa0b2619d16_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:de77acd77b0d96e98cade06428f562018d975204c439d1f9eb5fa861da95dd0b_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:07b8cf8f427b8012fb06f25ae6b9c914ee5afa854a12d025b027ab45a66f03dc_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:793af66664c7f9258db7b76da07d1f4359cfd00267e7b30b6e286f56fa107c9c_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:863bdc2ff0e0f453db71c06996571563b662c33d711481ef9447f7b599d653b4_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-12-17T19:42:16+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5605" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:492c9108e48616af210528103f20194ef29fa4cd8d9763c94d96b6f265e4469e_amd64", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:c16704fcd90730c2fb0d8de17dd88c8439167d0b05609fccacde179878941b4d_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:cd06aed28dac2e6bfe353648f87ac36a1c026ce7a19c354641de52a88fabe634_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:7959ba718b188efd0148f75f53cf5f44c78c930dd9d42e1d956e24c626ea2750_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:9f0961dd0244e87ee0ac84b4c0e6429587ae4f9693f4d2eccb2aea8bfbb5c976_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:ce2193663c4a7f745297f8ffe31a5928fa4897094a33af62f0baeb5cbc16f93f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:0d5d1bd9b22e36f2631798d0de425a2d9d2733089d1236f64187e6d6b2dc8f70_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:3b6e4a5ef4f5d7d4337914aea48c763ff880b69bfc7d38c58f89df971bb5ae08_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:fc8f005b12eff3ffcf98c8af6990a751140c006809c1e98a55b50a56834566c2_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:3d3974fa0859d2515876eff3536cc02b6f38edc54f3abf95cf6d89eff15e9c03_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:672dc6d72efceb4028b8d9d5797c294d4e29cab89d1c3252fd8f67d5e695039f_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:9b31ac173c178cb1fd1615d203a734d1b1ba167ef9fad4f6385fda165a3ab010_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:24fdccaa3e922e377ab4afc5e9f1688ab9b6ad62d4f67c3d8f9eb514d57e71d1_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:4ad4f6e105496f0cb6e5153bdcc67af0b580e5edd894d2481d8c8d3fe7a8a7c1_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:88236806d818e3f32137ea71824133b4373829325e82ba23e0fe2f199850a3ba_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2021_1016
Vulnerability from csaf_redhat
Published
2021-04-13 23:35
Modified
2024-11-13 22:20
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.5.37 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.5.37 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.5.37. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2021:1015
All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
-between-minor.html#understanding-upgrade-channels_updating-cluster-between
-minor
Security Fix(es):
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.5.37 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.5.37. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1015\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n-between-minor.html#understanding-upgrade-channels_updating-cluster-between\n-minor\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1016", "url": "https://access.redhat.com/errata/RHSA-2021:1016" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1944040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944040" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1016.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.5.37 security update", "tracking": { "current_release_date": "2024-11-13T22:20:26+00:00", "generator": { "date": "2024-11-13T22:20:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2021:1016", "initial_release_date": "2021-04-13T23:35:52+00:00", "revision_history": [ { "date": "2021-04-13T23:35:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-13T23:35:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:20:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.5", "product": { "name": "Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.5::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "product": { "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "product": { "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=src" } } }, { "category": "product_version", "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "product": { "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src", "product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "podman-0:1.9.3-2.rhaos4.5.el8.src", "product": { "name": "podman-0:1.9.3-2.rhaos4.5.el8.src", "product_id": "podman-0:1.9.3-2.rhaos4.5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "product": { "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product": { "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product": { "name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product": { "name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product": { "name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "product": { "name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64", "product": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "product": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "product": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "product": { "name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_id": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "product": { "name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "product": { "name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "product": { "name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "product": { "name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "product": { "name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "product": { "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "product": { "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=s390x" } } }, { "category": "product_version", "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product": { "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product": { "name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product": { "name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product": { "name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "product": { "name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "product": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "product": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "product": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x", "product": { "name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x", "product_id": "podman-0:1.9.3-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "product": { "name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "product": { "name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "product": { "name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "product": { "name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "product": { "name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "product": { "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "product_id": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubefed-client@4.5.0-202002271711.git.2.3bd46d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-5.git7c289cc.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-5.git7c289cc.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product": { "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_id": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product": { "name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_id": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product": { "name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_id": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_id": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.35.1-12.rhaos4.5.gitb4d18ad.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product": { "name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_id": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product": { "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_id": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_id": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_id": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_id": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.1.1-2.rhaos4.5.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product": { "name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_id": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.9.3-2.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product": { "name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_id": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.9.3-2.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product": { "name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_id": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.9.3-2.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product": { "name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_id": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.9.3-2.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product": { "name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_id": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.9.3-2.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product": { "name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_id": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.9.3-2.rhaos4.5.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "product": { "name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "product_id": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@1.9.3-2.rhaos4.5.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le" }, "product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x" }, "product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src" }, "product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64" }, "product_reference": "kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x" }, "product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src" }, "product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le" }, "product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x" }, "product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64" }, "product_reference": "containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le" }, "product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x" }, "product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src" }, "product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64" }, "product_reference": "ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x" }, "product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x" }, "product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64" }, "product_reference": "ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le" }, "product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x" }, "product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64" }, "product_reference": "ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le" }, "product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x" }, "product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src" }, "product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64" }, "product_reference": "podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le" }, "product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x" }, "product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64" }, "product_reference": "podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le" }, "product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x" }, "product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64" }, "product_reference": "podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch" }, "product_reference": "podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le" }, "product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x" }, "product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64" }, "product_reference": "podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x" }, "product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64" }, "product_reference": "podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le" }, "product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x" }, "product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64" }, "product_reference": "podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64" }, "product_reference": "skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le" }, "product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x" }, "product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64" }, "product_reference": "skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le" }, "product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x" }, "product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64" }, "product_reference": "skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le" }, "product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x" }, "product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.5", "product_id": "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64" }, "product_reference": "skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-13T23:35:52+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1016" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-13T23:35:52+00:00", "details": "For OpenShift Container Platform 4.5 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1016" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.ppc64le", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.s390x", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.src", "7Server-RH7-RHOSE-4.5:kubefed-client-0:4.5.0-202002271711.git.2.3bd46d6.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.src", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-0:0.2-5.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.s390x", "7Server-RH7-RHOSE-4.5:openshift-eventrouter-debuginfo-0:0.2-5.git7c289cc.el7.x86_64", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:containers-common-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.src", "8Base-RHOSE-4.5:ignition-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-debugsource-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.ppc64le", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.s390x", "8Base-RHOSE-4.5:ignition-validate-debuginfo-0:0.35.1-12.rhaos4.5.gitb4d18ad.el8.x86_64", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:podman-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-debugsource-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-docker-0:1.9.3-2.rhaos4.5.el8.noarch", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-remote-debuginfo-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:podman-tests-0:1.9.3-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.src", "8Base-RHOSE-4.5:skopeo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debuginfo-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-debugsource-1:1.1.1-2.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.s390x", "8Base-RHOSE-4.5:skopeo-tests-1:1.1.1-2.rhaos4.5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhba-2020_4197
Vulnerability from csaf_redhat
Published
2020-10-27 14:47
Modified
2024-11-22 15:06
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6 GA RPMs
Notes
Topic
Red Hat OpenShift Container Platform release 4.6.1 is now available with
updates to packages and images that fix several bugs and add enhancements.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat
OpenShift Container Platform 4.6.1. See the following advisory for the
container images for this release:
https://access.redhat.com/errata/RHBA-2020:4196
Space precludes documenting all of the bug fixes and enhancements in this
advisory, as well as all of the container images in this advisory. See the
following Release Notes documentation, which will be updated shortly for
this release, for details about these changes:
https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html
All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.6.1 is now available with\nupdates to packages and images that fix several bugs and add enhancements.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.6.1. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2020:4196\n\nSpace precludes documenting all of the bug fixes and enhancements in this\nadvisory, as well as all of the container images in this advisory. See the\nfollowing Release Notes documentation, which will be updated shortly for\nthis release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2020:4197", "url": "https://access.redhat.com/errata/RHBA-2020:4197" }, { "category": "external", "summary": "1834410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834410" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_4197.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6 GA RPMs", "tracking": { "current_release_date": "2024-11-22T15:06:06+00:00", "generator": { "date": "2024-11-22T15:06:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2020:4197", "initial_release_date": "2020-10-27T14:47:06+00:00", "revision_history": [ { "date": "2020-10-27T14:47:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-27T14:47:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:06:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product": { "name": "Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "product": { "name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "product_id": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl100-firmware@39.31.5.1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "product": { "name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "product_id": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl1000-firmware@39.31.5.1-98.el8.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "product": { "name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "product_id": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl105-firmware@18.168.6.1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "product": { "name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "product_id": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl135-firmware@18.168.6.1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "product": { "name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "product_id": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl2000-firmware@18.168.6.1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "product": { "name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "product_id": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl2030-firmware@18.168.6.1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "product": { "name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "product_id": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl3160-firmware@25.30.13.0-98.el8.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "product": { "name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "product_id": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl3945-firmware@15.32.2.9-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "product": { "name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "product_id": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl4965-firmware@228.61.2.24-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "product": { "name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "product_id": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl5000-firmware@8.83.5.1_1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "product": { "name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "product_id": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl5150-firmware@8.24.2.2-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "product": { "name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "product_id": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl6000-firmware@9.221.4.1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "product": { "name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "product_id": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl6000g2a-firmware@18.168.6.1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "product": { "name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "product_id": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl6000g2b-firmware@18.168.6.1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "product": { "name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "product_id": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl6050-firmware@41.28.5.1-98.el8.1?arch=noarch" } } }, { "category": "product_version", "name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "product": { "name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "product_id": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/iwl7260-firmware@25.30.13.0-98.el8.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product": { "name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product_id": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/libertas-sd8686-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch" } } }, { "category": "product_version", "name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product": { "name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product_id": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/libertas-sd8787-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch" } } }, { "category": "product_version", "name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "product": { "name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "product_id": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/libertas-usb8388-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product": { "name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product_id": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/libertas-usb8388-olpc-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch" } } }, { "category": "product_version", "name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product": { "name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product_id": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/linux-firmware@20200512-98.gitb2cad6a2.el8?arch=noarch" } } }, { "category": "product_version", "name": "pprof-0:2.6.3-2.el8+7.noarch", "product": { "name": "pprof-0:2.6.3-2.el8+7.noarch", "product_id": "pprof-0:2.6.3-2.el8+7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pprof@2.6.3-2.el8%2B7?arch=noarch" } } }, { "category": "product_version", "name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product": { "name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_id": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kuryr-binding-scripts@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product": { "name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_id": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product": { "name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_id": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-lib-tests@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch", "product": { "name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch", "product_id": "python3-pyroute2-0:0.5.3-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyroute2@0.5.3-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "protobuf-vim-0:3.6.1-4.el8ost.noarch", "product": { "name": "protobuf-vim-0:3.6.1-4.el8ost.noarch", "product_id": "protobuf-vim-0:3.6.1-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-vim@3.6.1-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-protobuf-0:3.6.1-4.el8ost.noarch", "product": { "name": "python3-protobuf-0:3.6.1-4.el8ost.noarch", "product_id": "python3-protobuf-0:3.6.1-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-protobuf@3.6.1-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "product": { "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=noarch" } } }, { "category": "product_version", "name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch", "product": { "name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch", "product_id": "ansible-runner-http-0:1.0.0-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "product": { "name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "product_id": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-requests-unixsocket@0.1.5-5.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "product": { "name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "product_id": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-lib@4.3.0-0.20200605221931.df238ba.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product": { "name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product_id": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product": { "name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product_id": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openstacksdk-tests@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "product": { "name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "product_id": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch", "product": { "name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch", "product_id": "python3-zeroconf-0:0.24.4-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-zeroconf@0.24.4-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch", "product": { "name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch", "product_id": "python3-ifaddr-0:0.1.6-5.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ifaddr@0.1.6-5.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-construct-0:2.10.56-1.el8ost.noarch", "product": { "name": "python3-construct-0:2.10.56-1.el8ost.noarch", "product_id": "python3-construct-0:2.10.56-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-construct@2.10.56-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-kubernetes-0:11.0.0-1.el8.noarch", "product": { "name": "python3-kubernetes-0:11.0.0-1.el8.noarch", "product_id": "python3-kubernetes-0:11.0.0-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kubernetes@11.0.0-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "product": { "name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "product_id": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kubernetes-tests@11.0.0-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-openshift-1:0.11.2-1.el8.noarch", "product": { "name": "python3-openshift-1:0.11.2-1.el8.noarch", "product_id": "python3-openshift-1:0.11.2-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openshift@0.11.2-1.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_id": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/octavia-amphora-image-x86_64@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-all@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-ipa@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-ipa-ppc64le@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-ipa-x86_64@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-minimal@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-ppc64le@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-x86_64@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "product": { "name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "product_id": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-config-connectivity-redhat@1.22.8-6.el8_2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "product": { "name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "product_id": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-config-server@1.22.8-6.el8_2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "product": { "name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "product_id": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-dispatcher-routing-rules@1.22.8-6.el8_2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-pexpect-0:4.6-2.el8ar.noarch", "product": { "name": "python3-pexpect-0:4.6-2.el8ar.noarch", "product_id": "python3-pexpect-0:4.6-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pexpect@4.6-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "python3-lockfile-1:0.11.0-8.el8ar.noarch", "product": { "name": "python3-lockfile-1:0.11.0-8.el8ar.noarch", "product_id": "python3-lockfile-1:0.11.0-8.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-lockfile@0.11.0-8.el8ar?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-daemon-0:2.1.2-9.el8ar.noarch", "product": { "name": "python3-daemon-0:2.1.2-9.el8ar.noarch", "product_id": "python3-daemon-0:2.1.2-9.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-daemon@2.1.2-9.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "ansible-runner-0:1.4.6-2.el8ar.noarch", "product": { "name": "ansible-runner-0:1.4.6-2.el8ar.noarch", "product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "product": { "name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "product": { "name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "product_id": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-1.rhaos4.6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "product": { "name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "product_id": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-rsa-0:4.6-1.el8.noarch", "product": { "name": "python3-rsa-0:4.6-1.el8.noarch", "product_id": "python3-rsa-0:4.6-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rsa@4.6-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "product": { "name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "product_id": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-concurrency-lang@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "product": { "name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "product_id": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-concurrency@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "product": { "name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "product_id": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-concurrency-tests@4.2.0-0.20200708091908.35e4df4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product": { "name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_id": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product": { "name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_id": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-api@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product": { "name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_id": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-conductor@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product": { "name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_id": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-dnsmasq@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product": { "name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_id": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-inspector-tests@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python-flask-doc-1:1.1.1-1.el8ost.noarch", "product": { "name": "python-flask-doc-1:1.1.1-1.el8ost.noarch", "product_id": "python-flask-doc-1:1.1.1-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-flask-doc@1.1.1-1.el8ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-flask-1:1.1.1-1.el8ost.noarch", "product": { "name": "python3-flask-1:1.1.1-1.el8ost.noarch", "product_id": "python3-flask-1:1.1.1-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-flask@1.1.1-1.el8ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "product": { "name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "product_id": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.rhaos4.6.el8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-pbr-0:5.4.3-2.el8ost.noarch", "product": { "name": "python3-pbr-0:5.4.3-2.el8ost.noarch", "product_id": "python3-pbr-0:5.4.3-2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pbr@5.4.3-2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "product": { "name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "product_id": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "product": { "name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "product_id": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-tests@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "product": { "name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "product_id": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-test@2.13.0-52.el8fdp?arch=noarch" } } }, { "category": "product_version", "name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch", "product": { "name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch", "product_id": "python3-websocket-client-0:0.54.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-websocket-client@0.54.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-string_utils-0:0.6.0-4.el8ost.noarch", "product": { "name": "python3-string_utils-0:0.6.0-4.el8ost.noarch", "product_id": "python3-string_utils-0:0.6.0-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-string_utils@0.6.0-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-google-auth-0:1.3.0-1.el8ost.noarch", "product": { "name": "python3-google-auth-0:1.3.0-1.el8ost.noarch", "product_id": "python3-google-auth-0:1.3.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-google-auth@1.3.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "product": { "name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "product_id": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-dictdiffer@0.7.1-2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-certifi-0:2018.10.15-4.el8ost.noarch", "product": { "name": "python3-certifi-0:2018.10.15-4.el8ost.noarch", "product_id": "python3-certifi-0:2018.10.15-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-certifi@2018.10.15-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python2-cachetools-0:3.1.0-1.el8ost.noarch", "product": { "name": "python2-cachetools-0:3.1.0-1.el8ost.noarch", "product_id": "python2-cachetools-0:3.1.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-cachetools@3.1.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-cachetools-0:3.1.0-1.el8ost.noarch", "product": { "name": "python3-cachetools-0:3.1.0-1.el8ost.noarch", "product_id": "python3-cachetools-0:3.1.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cachetools@3.1.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch", "product": { "name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch", "product_id": "python3-s3transfer-0:0.2.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-s3transfer@0.2.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-boto3-0:1.9.101-1.el8ost.noarch", "product": { "name": "python3-boto3-0:1.9.101-1.el8ost.noarch", "product_id": "python3-boto3-0:1.9.101-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-boto3@1.9.101-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python2-botocore-0:1.12.119-1.el8ost.noarch", "product": { "name": "python2-botocore-0:1.12.119-1.el8ost.noarch", "product_id": "python2-botocore-0:1.12.119-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-botocore@1.12.119-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-botocore-0:1.12.119-1.el8ost.noarch", "product": { "name": "python3-botocore-0:1.12.119-1.el8ost.noarch", "product_id": "python3-botocore-0:1.12.119-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-botocore@1.12.119-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-0:2.235.5.1600670743-1.el8.noarch", "product": { "name": "jenkins-0:2.235.5.1600670743-1.el8.noarch", "product_id": "jenkins-0:2.235.5.1600670743-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.235.5.1600670743-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "product": { "name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "product_id": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "product": { "name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "product_id": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-tenacity-0:6.2.0-1.el8ost.noarch", "product": { "name": "python3-tenacity-0:6.2.0-1.el8ost.noarch", "product_id": "python3-tenacity-0:6.2.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-tenacity@6.2.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch", "product": { "name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch", "product_id": "python3-werkzeug-0:1.0.1-3.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-werkzeug@1.0.1-3.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product": { "name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product_id": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product": { "name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product_id": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-oem-idrac-tests@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product": { "name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product_id": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-api@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product": { "name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product_id": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-common@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product": { "name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product_id": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-conductor@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product": { "name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product_id": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-tests@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product": { "name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_id": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-db-lang@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product": { "name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_id": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product": { "name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_id": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-db-tests@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-alembic-0:1.4.2-5.el8ost.noarch", "product": { "name": "python3-alembic-0:1.4.2-5.el8ost.noarch", "product_id": "python3-alembic-0:1.4.2-5.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-alembic@1.4.2-5.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.24.1.el8_2.dt1?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product_id": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.24.1.el8_2.dt1?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product_id": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "product": { "name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "product_id": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.19-3.rhaos4.6.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "product": { "name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "product_id": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-issuegen@0.19-3.rhaos4.6.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "product": { "name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "product_id": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-profile@0.19-3.rhaos4.6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python2-boto3-0:1.4.0-1.el7.noarch", "product": { "name": "python2-boto3-0:1.4.0-1.el7.noarch", "product_id": "python2-boto3-0:1.4.0-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-boto3@1.4.0-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "python2-botocore-0:1.4.57-5.el7.noarch", "product": { "name": "python2-botocore-0:1.4.57-5.el7.noarch", "product_id": "python2-botocore-0:1.4.57-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-botocore@1.4.57-5.el7?arch=noarch" } } }, { "category": "product_version", "name": "python2-s3transfer-0:0.1.3-1.el7.noarch", "product": { "name": "python2-s3transfer-0:0.1.3-1.el7.noarch", "product_id": "python2-s3transfer-0:0.1.3-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-s3transfer@0.1.3-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "product": { "name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "product_id": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "product_id": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "product": { "name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "product_id": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/linux-firmware@20200512-98.gitb2cad6a2.el8?arch=src" } } }, { "category": "product_version", "name": "libunwind-0:1.2.1-5.el8.src", "product": { "name": "libunwind-0:1.2.1-5.el8.src", "product_id": "libunwind-0:1.2.1-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=src" } } }, { "category": "product_version", "name": "libnftnl-0:1.1.5-4.el8.src", "product": { "name": "libnftnl-0:1.1.5-4.el8.src", "product_id": "libnftnl-0:1.1.5-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=src" } } }, { "category": "product_version", "name": "gperftools-0:2.6.3-2.el8+7.src", "product": { "name": "gperftools-0:2.6.3-2.el8+7.src", "product_id": "gperftools-0:2.6.3-2.el8+7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=src" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-4.5.el8ost.src", "product": { "name": "libsodium-0:1.0.16-4.5.el8ost.src", "product_id": "libsodium-0:1.0.16-4.5.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "product": { "name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "product_id": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=src" } } }, { "category": "product_version", "name": "buildah-0:1.11.6-8.rhaos4.5.el8.src", "product": { "name": "buildah-0:1.11.6-8.rhaos4.5.el8.src", "product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=src" } } }, { "category": "product_version", "name": "python-pyroute2-0:0.5.3-4.el8ost.src", "product": { "name": "python-pyroute2-0:0.5.3-4.el8ost.src", "product_id": "python-pyroute2-0:0.5.3-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyroute2@0.5.3-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-3.el8.src", "product": { "name": "cri-tools-0:1.18.0-3.el8.src", "product_id": "cri-tools-0:1.18.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "protobuf-0:3.6.1-4.el8ost.src", "product": { "name": "protobuf-0:3.6.1-4.el8ost.src", "product_id": "protobuf-0:3.6.1-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "product": { "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=src" } } }, { "category": "product_version", "name": "grpc-0:1.18.0-4.el8ost.src", "product": { "name": "grpc-0:1.18.0-4.el8ost.src", "product_id": "grpc-0:1.18.0-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "product": { "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=src" } } }, { "category": "product_version", "name": "dracut-0:049-75.git20200422.el8.src", "product": { "name": "dracut-0:049-75.git20200422.el8.src", "product_id": "dracut-0:049-75.git20200422.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=src" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:46.82-2.el8.src", "product": { "name": "redhat-release-coreos-0:46.82-2.el8.src", "product_id": "redhat-release-coreos-0:46.82-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=src" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "product": { "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=src" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el8.src", "product": { "name": "faq-0:0.0.6-4.el8.src", "product_id": "faq-0:0.0.6-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=src" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el8.src", "product": { "name": "jq-0:1.6-2.el8.src", "product_id": "jq-0:1.6-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=src" } } }, { "category": "product_version", "name": "openssl-1:1.1.1c-15.el8.src", "product": { "name": "openssl-1:1.1.1c-15.el8.src", "product_id": "openssl-1:1.1.1c-15.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "tini-0:0.16.1-1.el8ar.src", "product": { "name": "tini-0:0.16.1-1.el8ar.src", "product_id": "tini-0:0.16.1-1.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=src" } } }, { "category": "product_version", "name": "python-psutil-0:5.6.6-1.el8ar.src", "product": { "name": "python-psutil-0:5.6.6-1.el8ar.src", "product_id": "python-psutil-0:5.6.6-1.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil@5.6.6-1.el8ar?arch=src" } } }, { "category": "product_version", "name": "ansible-runner-http-0:1.0.0-2.el8ar.src", "product": { "name": "ansible-runner-http-0:1.0.0-2.el8ar.src", "product_id": "ansible-runner-http-0:1.0.0-2.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=src" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "inotify-tools-0:3.20.1-2.el8.src", "product": { "name": "inotify-tools-0:3.20.1-2.el8.src", "product_id": "inotify-tools-0:3.20.1-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=src" } } }, { "category": "product_version", "name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src", "product": { "name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src", "product_id": "python-requests-unixsocket-0:0.1.5-5.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-requests-unixsocket@0.1.5-5.el8ar?arch=src" } } }, { "category": "product_version", "name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "product": { "name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "product_id": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ironic-lib@4.3.0-0.20200605221931.df238ba.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "product": { "name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "product_id": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "product": { "name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "product_id": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-zeroconf-0:0.24.4-1.el8ost.src", "product": { "name": "python-zeroconf-0:0.24.4-1.el8ost.src", "product_id": "python-zeroconf-0:0.24.4-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-zeroconf@0.24.4-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-ifaddr-0:0.1.6-5.el8ost.src", "product": { "name": "python-ifaddr-0:0.1.6-5.el8ost.src", "product_id": "python-ifaddr-0:0.1.6-5.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ifaddr@0.1.6-5.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-construct-0:2.10.56-1.el8ost.src", "product": { "name": "python-construct-0:2.10.56-1.el8ost.src", "product_id": "python-construct-0:2.10.56-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-construct@2.10.56-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-kubernetes-0:11.0.0-1.el8.src", "product": { "name": "python-kubernetes-0:11.0.0-1.el8.src", "product_id": "python-kubernetes-0:11.0.0-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kubernetes@11.0.0-1.el8?arch=src" } } }, { "category": "product_version", "name": "python-openshift-1:0.11.2-1.el8.src", "product": { "name": "python-openshift-1:0.11.2-1.el8.src", "product_id": "python-openshift-1:0.11.2-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openshift@0.11.2-1.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src", "product": { "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src", "product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=src" } } }, { "category": "product_version", "name": "NetworkManager-1:1.22.8-6.el8_2.src", "product": { "name": "NetworkManager-1:1.22.8-6.el8_2.src", "product_id": "NetworkManager-1:1.22.8-6.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "haproxy-0:2.0.16-3.el8.src", "product": { "name": "haproxy-0:2.0.16-3.el8.src", "product_id": "haproxy-0:2.0.16-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy@2.0.16-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-pexpect-0:4.6-2.el8ar.src", "product": { "name": "python-pexpect-0:4.6-2.el8ar.src", "product_id": "python-pexpect-0:4.6-2.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pexpect@4.6-2.el8ar?arch=src" } } }, { "category": "product_version", "name": "python-lockfile-1:0.11.0-8.el8ar.src", "product": { "name": "python-lockfile-1:0.11.0-8.el8ar.src", "product_id": "python-lockfile-1:0.11.0-8.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-lockfile@0.11.0-8.el8ar?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-daemon-0:2.1.2-9.el8ar.src", "product": { "name": "python-daemon-0:2.1.2-9.el8ar.src", "product_id": "python-daemon-0:2.1.2-9.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-daemon@2.1.2-9.el8ar?arch=src" } } }, { "category": "product_version", "name": "ansible-runner-0:1.4.6-2.el8ar.src", "product": { "name": "ansible-runner-0:1.4.6-2.el8ar.src", "product_id": "ansible-runner-0:1.4.6-2.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src", "product": { "name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src", "product_id": "toolbox-0:0.0.8-1.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-1.rhaos4.6.el8?arch=src" } } }, { "category": "product_version", "name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "product": { "name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "product_id": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-rsa-0:4.6-1.el8.src", "product": { "name": "python-rsa-0:4.6-1.el8.src", "product_id": "python-rsa-0:4.6-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rsa@4.6-1.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "product": { "name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "product_id": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-concurrency@4.2.0-0.20200708091908.35e4df4.el8ost?arch=src" } } }, { "category": "product_version", "name": "rpm-ostree-0:2020.4-1.el8.src", "product": { "name": "rpm-ostree-0:2020.4-1.el8.src", "product_id": "rpm-ostree-0:2020.4-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "product": { "name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "product_id": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.2.1-0.20200727083213.9ecb6e3.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-flask-1:1.1.1-1.el8ost.src", "product": { "name": "python-flask-1:1.1.1-1.el8ost.src", "product_id": "python-flask-1:1.1.1-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-flask@1.1.1-1.el8ost?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "product": { "name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "product_id": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.144.0-1.rhaos4.6.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "python-pbr-0:5.4.3-2.el8ost.src", "product": { "name": "python-pbr-0:5.4.3-2.el8ost.src", "product_id": "python-pbr-0:5.4.3-2.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pbr@5.4.3-2.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "product": { "name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "product_id": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-sushy@3.3.0-0.20200804091926.0dfe74a.el8ost?arch=src" } } }, { "category": "product_version", "name": "openvswitch2.13-0:2.13.0-52.el8fdp.src", "product": { "name": "openvswitch2.13-0:2.13.0-52.el8fdp.src", "product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=src" } } }, { "category": "product_version", "name": "python-websocket-client-0:0.54.0-1.el8ost.src", "product": { "name": "python-websocket-client-0:0.54.0-1.el8ost.src", "product_id": "python-websocket-client-0:0.54.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-websocket-client@0.54.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-string_utils-0:0.6.0-4.el8ost.src", "product": { "name": "python-string_utils-0:0.6.0-4.el8ost.src", "product_id": "python-string_utils-0:0.6.0-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-string_utils@0.6.0-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src", "product": { "name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src", "product_id": "python-ruamel-yaml-0:0.15.41-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ruamel-yaml@0.15.41-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-google-auth-0:1.3.0-1.el8ost.src", "product": { "name": "python-google-auth-0:1.3.0-1.el8ost.src", "product_id": "python-google-auth-0:1.3.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-google-auth@1.3.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-dictdiffer-0:0.7.1-2.el8ost.src", "product": { "name": "python-dictdiffer-0:0.7.1-2.el8ost.src", "product_id": "python-dictdiffer-0:0.7.1-2.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-dictdiffer@0.7.1-2.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-certifi-0:2018.10.15-4.el8ost.src", "product": { "name": "python-certifi-0:2018.10.15-4.el8ost.src", "product_id": "python-certifi-0:2018.10.15-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-certifi@2018.10.15-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-cachetools-0:3.1.0-1.el8ost.src", "product": { "name": "python-cachetools-0:3.1.0-1.el8ost.src", "product_id": "python-cachetools-0:3.1.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cachetools@3.1.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-s3transfer-0:0.2.0-1.el8ost.src", "product": { "name": "python-s3transfer-0:0.2.0-1.el8ost.src", "product_id": "python-s3transfer-0:0.2.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-s3transfer@0.2.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-boto3-0:1.9.101-1.el8ost.src", "product": { "name": "python-boto3-0:1.9.101-1.el8ost.src", "product_id": "python-boto3-0:1.9.101-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-boto3@1.9.101-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-botocore-0:1.12.119-1.el8ost.src", "product": { "name": "python-botocore-0:1.12.119-1.el8ost.src", "product_id": "python-botocore-0:1.12.119-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-botocore@1.12.119-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "product": { "name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "product_id": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn@4.5.0-2.rhaos4.6.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.235.5.1600670743-1.el8.src", "product": { "name": "jenkins-0:2.235.5.1600670743-1.el8.src", "product_id": "jenkins-0:2.235.5.1600670743-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.235.5.1600670743-1.el8?arch=src" } } }, { "category": "product_version", "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "product": { "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "product": { "name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "product_id": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.3.1-0.20200918042952.9dd968f.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-tenacity-0:6.2.0-1.el8ost.src", "product": { "name": "python-tenacity-0:6.2.0-1.el8ost.src", "product_id": "python-tenacity-0:6.2.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tenacity@6.2.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-werkzeug-0:1.0.1-3.el8ost.src", "product": { "name": "python-werkzeug-0:1.0.1-3.el8ost.src", "product_id": "python-werkzeug-0:1.0.1-3.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-werkzeug@1.0.1-3.el8ost?arch=src" } } }, { "category": "product_version", "name": "ostree-0:2020.5-4.el8.src", "product": { "name": "ostree-0:2020.5-4.el8.src", "product_id": "ostree-0:2020.5-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=src" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el8.src", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.src", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "product": { "name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "product_id": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "product": { "name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "product_id": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic@15.2.1-0.20200929104811.fb90ed4.el8ost?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "product": { "name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "product_id": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-alembic-0:1.4.2-5.el8ost.src", "product": { "name": "python-alembic-0:1.4.2-5.el8ost.src", "product_id": "python-alembic-0:1.4.2-5.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-alembic@1.4.2-5.el8ost?arch=src" } } }, { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "product": { "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=src" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "product": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "product": { "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "product": { "name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "product_id": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202010011649.p0.git.2200.e296ba5.el8?arch=src" } } }, { "category": "product_version", "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "product": { "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=src" } } }, { "category": "product_version", "name": "ovn2.13-0:20.09.0-1.el8fdp.src", "product": { "name": "ovn2.13-0:20.09.0-1.el8fdp.src", "product_id": "ovn2.13-0:20.09.0-1.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "product": { "name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "product_id": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202010022112.p0.git.94033.ef41184.el8?arch=src" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "product": { "name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "product_id": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.19-3.rhaos4.6.el8?arch=src" } } }, { "category": "product_version", "name": "python-boto3-0:1.4.0-1.el7.src", "product": { "name": "python-boto3-0:1.4.0-1.el7.src", "product_id": "python-boto3-0:1.4.0-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-boto3@1.4.0-1.el7?arch=src" } } }, { "category": "product_version", "name": "python-botocore-0:1.4.57-5.el7.src", "product": { "name": "python-botocore-0:1.4.57-5.el7.src", "product_id": "python-botocore-0:1.4.57-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-botocore@1.4.57-5.el7?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-3.el7.src", "product": { "name": "cri-tools-0:1.18.0-3.el7.src", "product_id": "cri-tools-0:1.18.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=src" } } }, { "category": "product_version", "name": "oniguruma-0:5.9.2-5.el7.src", "product": { "name": "oniguruma-0:5.9.2-5.el7.src", "product_id": "oniguruma-0:5.9.2-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=src" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el7.src", "product": { "name": "jq-0:1.6-2.el7.src", "product_id": "jq-0:1.6-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=src" } } }, { "category": "product_version", "name": "python-s3transfer-0:0.1.3-1.el7.src", "product": { "name": "python-s3transfer-0:0.1.3-1.el7.src", "product_id": "python-s3transfer-0:0.1.3-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-s3transfer@0.1.3-1.el7?arch=src" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el7.src", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el7.src", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "product": { "name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "product_id": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202010011112.p0.git.0.f35f5eb.el7?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "product": { "name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "product_id": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.0-113.rhaos4.6.git97d715e.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "product": { "name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "product_id": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202010022112.p0.git.94033.ef41184.el7?arch=src" } } }, { "category": "product_version", "name": "s390utils-2:2.6.0-28.el8_2.2.src", "product": { "name": "s390utils-2:2.6.0-28.el8_2.2.src", "product_id": "s390utils-2:2.6.0-28.el8_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils@2.6.0-28.el8_2.2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libunwind-0:1.2.1-5.el8.ppc64le", "product": { "name": "libunwind-0:1.2.1-5.el8.ppc64le", "product_id": "libunwind-0:1.2.1-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libunwind-devel-0:1.2.1-5.el8.ppc64le", "product": { "name": "libunwind-devel-0:1.2.1-5.el8.ppc64le", "product_id": "libunwind-devel-0:1.2.1-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "product": { "name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "product_id": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "product": { "name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "product_id": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libnftnl-0:1.1.5-4.el8.ppc64le", "product": { "name": "libnftnl-0:1.1.5-4.el8.ppc64le", "product_id": "libnftnl-0:1.1.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le", "product": { "name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le", "product_id": "libnftnl-devel-0:1.1.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "product": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "product_id": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "product": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-0:2.6.3-2.el8+7.ppc64le", "product": { "name": "gperftools-0:2.6.3-2.el8+7.ppc64le", "product_id": "gperftools-0:2.6.3-2.el8+7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "product": { "name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "product_id": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "product": { "name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "product_id": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "product": { "name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "product": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-3.el8.ppc64le", "product": { "name": "cri-tools-0:1.18.0-3.el8.ppc64le", "product_id": "cri-tools-0:1.18.0-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "product": { "name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "product_id": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-static-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-cli-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-devel-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "product_id": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "product": { "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "product": { "name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "product": { "name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-caps-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-caps-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-caps-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-live-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-live-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-live-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-network-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-network-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-network-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-squash-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-squash-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-squash-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-tools-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-tools-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-tools-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "product": { "name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "product_id": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:46.82-2.el8.ppc64le", "product": { "name": "redhat-release-coreos-0:46.82-2.el8.ppc64le", "product_id": "redhat-release-coreos-0:46.82-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "product": { "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el8.ppc64le", "product": { "name": "faq-0:0.0.6-4.el8.ppc64le", "product_id": "faq-0:0.0.6-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el8.ppc64le", "product": { "name": "jq-0:1.6-2.el8.ppc64le", "product_id": "jq-0:1.6-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "jq-devel-0:1.6-2.el8.ppc64le", "product": { "name": "jq-devel-0:1.6-2.el8.ppc64le", "product_id": "jq-devel-0:1.6-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "jq-debugsource-0:1.6-2.el8.ppc64le", "product": { "name": "jq-debugsource-0:1.6-2.el8.ppc64le", "product_id": "jq-debugsource-0:1.6-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "jq-debuginfo-0:1.6-2.el8.ppc64le", "product": { "name": "jq-debuginfo-0:1.6-2.el8.ppc64le", "product_id": "jq-debuginfo-0:1.6-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openssl-1:1.1.1c-15.el8.ppc64le", "product": { "name": "openssl-1:1.1.1c-15.el8.ppc64le", "product_id": "openssl-1:1.1.1c-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1c-15.el8.ppc64le", "product": { "name": "openssl-devel-1:1.1.1c-15.el8.ppc64le", "product_id": "openssl-devel-1:1.1.1c-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-15.el8.ppc64le", "product": { "name": "openssl-libs-1:1.1.1c-15.el8.ppc64le", "product_id": "openssl-libs-1:1.1.1c-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1c-15.el8.ppc64le", "product": { "name": "openssl-perl-1:1.1.1c-15.el8.ppc64le", "product_id": "openssl-perl-1:1.1.1c-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.1.1c-15.el8.ppc64le", "product": { "name": "openssl-static-1:1.1.1c-15.el8.ppc64le", "product_id": "openssl-static-1:1.1.1c-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "product": { "name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "product_id": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "product": { "name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "product_id": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "tini-0:0.16.1-1.el8ar.ppc64le", "product": { "name": "tini-0:0.16.1-1.el8ar.ppc64le", "product_id": "tini-0:0.16.1-1.el8ar.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le", "product": { "name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le", "product_id": "python3-psutil-0:5.6.6-1.el8ar.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=ppc64le" } } }, { "category": "product_version", "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "product": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "product": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "product": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "inotify-tools-0:3.20.1-2.el8.ppc64le", "product": { "name": "inotify-tools-0:3.20.1-2.el8.ppc64le", "product_id": "inotify-tools-0:3.20.1-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "product": { "name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "product_id": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "product": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "product": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "haproxy20-0:2.0.16-3.el8.ppc64le", "product": { "name": "haproxy20-0:2.0.16-3.el8.ppc64le", "product_id": "haproxy20-0:2.0.16-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "product": { "name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "product_id": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "product": { "name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-0:2020.4-1.el8.ppc64le", "product": { "name": "rpm-ostree-0:2020.4-1.el8.ppc64le", "product_id": "rpm-ostree-0:2020.4-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "product": { "name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "product_id": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "product": { "name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "product_id": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "product": { "name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "product": { "name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "product": { "name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "product": { "name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "product": { "name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "product": { "name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "product": { "name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "product": { "name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "product": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "product": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "product": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "product": { "name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "product": { "name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "product": { "name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product": { "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product": { "name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_id": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.6.0-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product": { "name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product": { "name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-0:2020.5-4.el8.ppc64le", "product": { "name": "ostree-0:2020.5-4.el8.ppc64le", "product_id": "ostree-0:2020.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-devel-0:2020.5-4.el8.ppc64le", "product": { "name": "ostree-devel-0:2020.5-4.el8.ppc64le", "product_id": "ostree-devel-0:2020.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-grub2-0:2020.5-4.el8.ppc64le", "product": { "name": "ostree-grub2-0:2020.5-4.el8.ppc64le", "product_id": "ostree-grub2-0:2020.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-grub2@2020.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-libs-0:2020.5-4.el8.ppc64le", "product": { "name": "ostree-libs-0:2020.5-4.el8.ppc64le", "product_id": "ostree-libs-0:2020.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-debugsource-0:2020.5-4.el8.ppc64le", "product": { "name": "ostree-debugsource-0:2020.5-4.el8.ppc64le", "product_id": "ostree-debugsource-0:2020.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le", "product": { "name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le", "product_id": "ostree-debuginfo-0:2020.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "product": { "name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "product": { "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "product": { "name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "product_id": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "product": { "name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "product": { "name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "product": { "name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "product": { "name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product": { "name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product": { "name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product": { "name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libunwind-0:1.2.1-5.el8.x86_64", "product": { "name": "libunwind-0:1.2.1-5.el8.x86_64", "product_id": "libunwind-0:1.2.1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libunwind-devel-0:1.2.1-5.el8.x86_64", "product": { "name": "libunwind-devel-0:1.2.1-5.el8.x86_64", "product_id": "libunwind-devel-0:1.2.1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64", "product": { "name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64", "product_id": "libunwind-debugsource-0:1.2.1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "product": { "name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "product_id": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libnftnl-0:1.1.5-4.el8.x86_64", "product": { "name": "libnftnl-0:1.1.5-4.el8.x86_64", "product_id": "libnftnl-0:1.1.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libnftnl-devel-0:1.1.5-4.el8.x86_64", "product": { "name": "libnftnl-devel-0:1.1.5-4.el8.x86_64", "product_id": "libnftnl-devel-0:1.1.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "product": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "product_id": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "product": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-0:2.6.3-2.el8+7.x86_64", "product": { "name": "gperftools-0:2.6.3-2.el8+7.x86_64", "product_id": "gperftools-0:2.6.3-2.el8+7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64", "product": { "name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64", "product_id": "gperftools-devel-0:2.6.3-2.el8+7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64", "product": { "name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64", "product_id": "gperftools-libs-0:2.6.3-2.el8+7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "product": { "name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "product": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "product": { "name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "product": { "name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "product": { "name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "product": { "name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-3.el8.x86_64", "product": { "name": "cri-tools-0:1.18.0-3.el8.x86_64", "product_id": "cri-tools-0:1.18.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "product": { "name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "product_id": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-devel-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-lite-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-static-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-static-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-static-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-cli-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-cli-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-cli-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-devel-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-devel-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-devel-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-plugins-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64", "product": { "name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64", "product_id": "python3-grpcio-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "product": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "product": { "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "product": { "name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "product": { "name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-caps-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-caps-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-caps-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-config-generic-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-live-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-live-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-live-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-network-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-network-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-network-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-squash-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-squash-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-squash-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-tools-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-tools-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-tools-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-debugsource-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "product": { "name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "product_id": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:46.82-2.el8.x86_64", "product": { "name": "redhat-release-coreos-0:46.82-2.el8.x86_64", "product_id": "redhat-release-coreos-0:46.82-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "product": { "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=x86_64" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el8.x86_64", "product": { "name": "faq-0:0.0.6-4.el8.x86_64", "product_id": "faq-0:0.0.6-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el8.x86_64", "product": { "name": "jq-0:1.6-2.el8.x86_64", "product_id": "jq-0:1.6-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "jq-devel-0:1.6-2.el8.x86_64", "product": { "name": "jq-devel-0:1.6-2.el8.x86_64", "product_id": "jq-devel-0:1.6-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "jq-debugsource-0:1.6-2.el8.x86_64", "product": { "name": "jq-debugsource-0:1.6-2.el8.x86_64", "product_id": "jq-debugsource-0:1.6-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "jq-debuginfo-0:1.6-2.el8.x86_64", "product": { "name": "jq-debuginfo-0:1.6-2.el8.x86_64", "product_id": "jq-debuginfo-0:1.6-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-1:1.1.1c-15.el8.x86_64", "product": { "name": "openssl-1:1.1.1c-15.el8.x86_64", "product_id": "openssl-1:1.1.1c-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1c-15.el8.x86_64", "product": { "name": "openssl-devel-1:1.1.1c-15.el8.x86_64", "product_id": "openssl-devel-1:1.1.1c-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-15.el8.x86_64", "product": { "name": "openssl-libs-1:1.1.1c-15.el8.x86_64", "product_id": "openssl-libs-1:1.1.1c-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1c-15.el8.x86_64", "product": { "name": "openssl-perl-1:1.1.1c-15.el8.x86_64", "product_id": "openssl-perl-1:1.1.1c-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.1.1c-15.el8.x86_64", "product": { "name": "openssl-static-1:1.1.1c-15.el8.x86_64", "product_id": "openssl-static-1:1.1.1c-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64", "product": { "name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64", "product_id": "openssl-debugsource-1:1.1.1c-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "product": { "name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "product_id": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "tini-0:0.16.1-1.el8ar.x86_64", "product": { "name": "tini-0:0.16.1-1.el8ar.x86_64", "product_id": "tini-0:0.16.1-1.el8ar.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=x86_64" } } }, { "category": "product_version", "name": "python3-psutil-0:5.6.6-1.el8ar.x86_64", "product": { "name": "python3-psutil-0:5.6.6-1.el8ar.x86_64", "product_id": "python3-psutil-0:5.6.6-1.el8ar.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=x86_64" } } }, { "category": "product_version", "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "product": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=x86_64" } } }, { "category": "product_version", "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "product": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "product": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "inotify-tools-0:3.20.1-2.el8.x86_64", "product": { "name": "inotify-tools-0:3.20.1-2.el8.x86_64", "product_id": "inotify-tools-0:3.20.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64", "product": { "name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64", "product_id": "inotify-tools-devel-0:3.20.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "product": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "product": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "NetworkManager-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "haproxy20-0:2.0.16-3.el8.x86_64", "product": { "name": "haproxy20-0:2.0.16-3.el8.x86_64", "product_id": "haproxy20-0:2.0.16-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64", "product": { "name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64", "product_id": "haproxy-debugsource-0:2.0.16-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "product": { "name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-0:2020.4-1.el8.x86_64", "product": { "name": "rpm-ostree-0:2020.4-1.el8.x86_64", "product_id": "rpm-ostree-0:2020.4-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64", "product": { "name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64", "product_id": "rpm-ostree-devel-0:2020.4-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64", "product": { "name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64", "product_id": "rpm-ostree-libs-0:2020.4-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "product": { "name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "product": { "name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "product": { "name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "product": { "name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "product": { "name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "product": { "name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "product": { "name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "product": { "name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "product": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "product": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "product": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "product": { "name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "product": { "name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "product": { "name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "product": { "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "product": { "name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "product": { "name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-0:2020.5-4.el8.x86_64", "product": { "name": "ostree-0:2020.5-4.el8.x86_64", "product_id": "ostree-0:2020.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-devel-0:2020.5-4.el8.x86_64", "product": { "name": "ostree-devel-0:2020.5-4.el8.x86_64", "product_id": "ostree-devel-0:2020.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-grub2-0:2020.5-4.el8.x86_64", "product": { "name": "ostree-grub2-0:2020.5-4.el8.x86_64", "product_id": "ostree-grub2-0:2020.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-grub2@2020.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-libs-0:2020.5-4.el8.x86_64", "product": { "name": "ostree-libs-0:2020.5-4.el8.x86_64", "product_id": "ostree-libs-0:2020.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-debugsource-0:2020.5-4.el8.x86_64", "product": { "name": "ostree-debugsource-0:2020.5-4.el8.x86_64", "product_id": "ostree-debugsource-0:2020.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-debuginfo-0:2020.5-4.el8.x86_64", "product": { "name": "ostree-debuginfo-0:2020.5-4.el8.x86_64", "product_id": "ostree-debuginfo-0:2020.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "product": { "name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.24.1.rt13.74.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "product": { "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64", "product": { "name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64", "product_id": "ovn2.13-0:20.09.0-1.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "product": { "name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "product": { "name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "product": { "name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "product": { "name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product": { "name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product": { "name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product": { "name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202010022112.p0.git.94033.ef41184.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-3.el7.x86_64", "product": { "name": "cri-tools-0:1.18.0-3.el7.x86_64", "product_id": "cri-tools-0:1.18.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "oniguruma-0:5.9.2-5.el7.x86_64", "product": { "name": "oniguruma-0:5.9.2-5.el7.x86_64", "product_id": "oniguruma-0:5.9.2-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "oniguruma-devel-0:5.9.2-5.el7.x86_64", "product": { "name": "oniguruma-devel-0:5.9.2-5.el7.x86_64", "product_id": "oniguruma-devel-0:5.9.2-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oniguruma-devel@5.9.2-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "product": { "name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "product_id": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oniguruma-debuginfo@5.9.2-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el7.x86_64", "product": { "name": "jq-0:1.6-2.el7.x86_64", "product_id": "jq-0:1.6-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jq-devel-0:1.6-2.el7.x86_64", "product": { "name": "jq-devel-0:1.6-2.el7.x86_64", "product_id": "jq-devel-0:1.6-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-devel@1.6-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jq-debuginfo-0:1.6-2.el7.x86_64", "product": { "name": "jq-debuginfo-0:1.6-2.el7.x86_64", "product_id": "jq-debuginfo-0:1.6-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "product": { "name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "product_id": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.0-113.rhaos4.6.git97d715e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-113.rhaos4.6.git97d715e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202010022112.p0.git.94033.ef41184.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libnftnl-0:1.1.5-4.el8.s390x", "product": { "name": "libnftnl-0:1.1.5-4.el8.s390x", "product_id": "libnftnl-0:1.1.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "libnftnl-devel-0:1.1.5-4.el8.s390x", "product": { "name": "libnftnl-devel-0:1.1.5-4.el8.s390x", "product_id": "libnftnl-devel-0:1.1.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x", "product": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x", "product_id": "libnftnl-debugsource-0:1.1.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "product": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-0:2.6.3-2.el8+7.s390x", "product": { "name": "gperftools-0:2.6.3-2.el8+7.s390x", "product_id": "gperftools-0:2.6.3-2.el8+7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8%2B7?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-devel-0:2.6.3-2.el8+7.s390x", "product": { "name": "gperftools-devel-0:2.6.3-2.el8+7.s390x", "product_id": "gperftools-devel-0:2.6.3-2.el8+7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8%2B7?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-libs-0:2.6.3-2.el8+7.s390x", "product": { "name": "gperftools-libs-0:2.6.3-2.el8+7.s390x", "product_id": "gperftools-libs-0:2.6.3-2.el8+7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8%2B7?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "product": { "name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "product_id": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8%2B7?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "product": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8%2B7?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-static-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "product": { "name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "product_id": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.11.6-8.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "product": { "name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "product_id": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.11.6-8.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "product": { "name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "product_id": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.11.6-8.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "product": { "name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "product_id": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.11.6-8.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "product": { "name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "product_id": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.11.6-8.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-3.el8.s390x", "product": { "name": "cri-tools-0:1.18.0-3.el8.s390x", "product_id": "cri-tools-0:1.18.0-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x", "product": { "name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x", "product_id": "cri-tools-debugsource-0:1.18.0-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.18.0-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "product": { "name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "product_id": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-compiler-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-devel-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-devel-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-devel-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-lite-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-lite-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-lite-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-static-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-static-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-static-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-cli-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-cli-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-cli-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-devel-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-devel-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-devel-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-plugins-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-plugins-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-plugins-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "python3-grpcio-0:1.18.0-4.el8ost.s390x", "product": { "name": "python3-grpcio-0:1.18.0-4.el8ost.s390x", "product_id": "python3-grpcio-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-debugsource-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "product": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "product": { "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "product_id": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles@2.18.1-12.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "product": { "name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "product_id": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles-debugsource@2.18.1-12.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "product": { "name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "product_id": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nss-altfiles-debuginfo@2.18.1-12.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-0:049-75.git20200422.el8.s390x", "product_id": "dracut-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-caps-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-caps-0:049-75.git20200422.el8.s390x", "product_id": "dracut-caps-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-caps@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-config-generic-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-config-generic-0:049-75.git20200422.el8.s390x", "product_id": "dracut-config-generic-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-generic@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x", "product_id": "dracut-config-rescue-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-rescue@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-live-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-live-0:049-75.git20200422.el8.s390x", "product_id": "dracut-live-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-live@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-network-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-network-0:049-75.git20200422.el8.s390x", "product_id": "dracut-network-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-network@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-squash-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-squash-0:049-75.git20200422.el8.s390x", "product_id": "dracut-squash-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-squash@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-tools-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-tools-0:049-75.git20200422.el8.s390x", "product_id": "dracut-tools-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-tools@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-debugsource-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-debugsource-0:049-75.git20200422.el8.s390x", "product_id": "dracut-debugsource-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debugsource@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x", "product": { "name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x", "product_id": "dracut-debuginfo-0:049-75.git20200422.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debuginfo@049-75.git20200422.el8?arch=s390x" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:46.82-2.el8.s390x", "product": { "name": "redhat-release-coreos-0:46.82-2.el8.s390x", "product_id": "redhat-release-coreos-0:46.82-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@46.82-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "product": { "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "product_id": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/machine-config-daemon@4.6.0-202007100531.p0.git.2669.abe1720.el8?arch=s390x" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el8.s390x", "product": { "name": "faq-0:0.0.6-4.el8.s390x", "product_id": "faq-0:0.0.6-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el8.s390x", "product": { "name": "jq-0:1.6-2.el8.s390x", "product_id": "jq-0:1.6-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "jq-devel-0:1.6-2.el8.s390x", "product": { "name": "jq-devel-0:1.6-2.el8.s390x", "product_id": "jq-devel-0:1.6-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "jq-debugsource-0:1.6-2.el8.s390x", "product": { "name": "jq-debugsource-0:1.6-2.el8.s390x", "product_id": "jq-debugsource-0:1.6-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "jq-debuginfo-0:1.6-2.el8.s390x", "product": { "name": "jq-debuginfo-0:1.6-2.el8.s390x", "product_id": "jq-debuginfo-0:1.6-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "openssl-1:1.1.1c-15.el8.s390x", "product": { "name": "openssl-1:1.1.1c-15.el8.s390x", "product_id": "openssl-1:1.1.1c-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1c-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1c-15.el8.s390x", "product": { "name": "openssl-devel-1:1.1.1c-15.el8.s390x", "product_id": "openssl-devel-1:1.1.1c-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1c-15.el8.s390x", "product": { "name": "openssl-libs-1:1.1.1c-15.el8.s390x", "product_id": "openssl-libs-1:1.1.1c-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1c-15.el8.s390x", "product": { "name": "openssl-perl-1:1.1.1c-15.el8.s390x", "product_id": "openssl-perl-1:1.1.1c-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.1.1c-15.el8.s390x", "product": { "name": "openssl-static-1:1.1.1c-15.el8.s390x", "product_id": "openssl-static-1:1.1.1c-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.1.1c-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1c-15.el8.s390x", "product": { "name": "openssl-debugsource-1:1.1.1c-15.el8.s390x", "product_id": "openssl-debugsource-1:1.1.1c-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x", "product": { "name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x", "product_id": "openssl-debuginfo-1:1.1.1c-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "product": { "name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "product_id": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-15.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "tini-0:0.16.1-1.el8ar.s390x", "product": { "name": "tini-0:0.16.1-1.el8ar.s390x", "product_id": "tini-0:0.16.1-1.el8ar.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=s390x" } } }, { "category": "product_version", "name": "python3-psutil-0:5.6.6-1.el8ar.s390x", "product": { "name": "python3-psutil-0:5.6.6-1.el8ar.s390x", "product_id": "python3-psutil-0:5.6.6-1.el8ar.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=s390x" } } }, { "category": "product_version", "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "product": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=s390x" } } }, { "category": "product_version", "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "product": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "product": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=s390x" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "product": { "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "product_id": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.6.0-202007100531.p0.git.1808.4843b08.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "inotify-tools-0:3.20.1-2.el8.s390x", "product": { "name": "inotify-tools-0:3.20.1-2.el8.s390x", "product_id": "inotify-tools-0:3.20.1-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "inotify-tools-devel-0:3.20.1-2.el8.s390x", "product": { "name": "inotify-tools-devel-0:3.20.1-2.el8.s390x", "product_id": "inotify-tools-devel-0:3.20.1-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "product": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "product": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "NetworkManager-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-team-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "product_id": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.22.8-6.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "haproxy20-0:2.0.16-3.el8.s390x", "product": { "name": "haproxy20-0:2.0.16-3.el8.s390x", "product_id": "haproxy20-0:2.0.16-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20@2.0.16-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.0.16-3.el8.s390x", "product": { "name": "haproxy-debugsource-0:2.0.16-3.el8.s390x", "product_id": "haproxy-debugsource-0:2.0.16-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.16-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "product": { "name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "product_id": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.16-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-0:2020.4-1.el8.s390x", "product": { "name": "rpm-ostree-0:2020.4-1.el8.s390x", "product_id": "rpm-ostree-0:2020.4-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree@2020.4-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-devel-0:2020.4-1.el8.s390x", "product": { "name": "rpm-ostree-devel-0:2020.4-1.el8.s390x", "product_id": "rpm-ostree-devel-0:2020.4-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.4-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-libs-0:2020.4-1.el8.s390x", "product": { "name": "rpm-ostree-libs-0:2020.4-1.el8.s390x", "product_id": "rpm-ostree-libs-0:2020.4-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.4-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "product": { "name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "product_id": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.4-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "product": { "name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "product_id": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.4-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "product": { "name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "product_id": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.4-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "product": { "name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "product_id": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-52.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "product": { "name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "product_id": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-52.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "product": { "name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "product_id": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-52.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "product": { "name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "product_id": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-52.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "product": { "name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "product_id": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-52.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "product": { "name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "product_id": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "product": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-52.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "product": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "product": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "product": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "product": { "name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "product_id": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@4.5.0-2.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "product": { "name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "product_id": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.5.0-2.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "product": { "name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "product_id": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@4.5.0-2.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "product": { "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "product_id": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.6.0-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "product": { "name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "product_id": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.6.0-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "product": { "name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "product_id": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.6.0-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.6.0-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "product": { "name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "product_id": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.6.0-3.rhaos4.6.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-0:2020.5-4.el8.s390x", "product": { "name": "ostree-0:2020.5-4.el8.s390x", "product_id": "ostree-0:2020.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree@2020.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-devel-0:2020.5-4.el8.s390x", "product": { "name": "ostree-devel-0:2020.5-4.el8.s390x", "product_id": "ostree-devel-0:2020.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-devel@2020.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-libs-0:2020.5-4.el8.s390x", "product": { "name": "ostree-libs-0:2020.5-4.el8.s390x", "product_id": "ostree-libs-0:2020.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs@2020.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-debugsource-0:2020.5-4.el8.s390x", "product": { "name": "ostree-debugsource-0:2020.5-4.el8.s390x", "product_id": "ostree-debugsource-0:2020.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debugsource@2020.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-debuginfo-0:2020.5-4.el8.s390x", "product": { "name": "ostree-debuginfo-0:2020.5-4.el8.s390x", "product_id": "ostree-debuginfo-0:2020.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debuginfo@2020.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "product": { "name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "product_id": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_id": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_id": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_id": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-81.rhaos4.6.git5b757d4.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.24.1.el8_2.dt1?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202010011936.p0.git.15.36f28b7.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "product": { "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "product_id": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "product_id": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "product_id": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.0-20.rhaos4.6.git97d715e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-5.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-0:20.09.0-1.el8fdp.s390x", "product": { "name": "ovn2.13-0:20.09.0-1.el8fdp.s390x", "product_id": "ovn2.13-0:20.09.0-1.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.09.0-1.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "product": { "name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "product_id": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-1.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "product": { "name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "product_id": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-1.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "product": { "name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "product_id": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-1.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "product": { "name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "product_id": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-1.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "product": { "name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "product_id": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-1.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "product": { "name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "product_id": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-1.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "product": { "name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "product_id": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-1.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-1.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "s390utils-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-base-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-base@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-cmsfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-cmsfs-fuse@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-cpacfstatsd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-cpuplugd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-devel@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-hmcdrvfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-iucvterm@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-mon_statd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-osasnmpd@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-zdsfs@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-ziomon@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-debugsource@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-base-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-cmsfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-cmsfs-fuse-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-cpacfstatsd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-cpuplugd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-hmcdrvfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-iucvterm-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-mon_statd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-osasnmpd-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-zdsfs-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product": { "name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_id": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/s390utils-ziomon-debuginfo@2.6.0-28.el8_2.2?arch=s390x\u0026epoch=2" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src" }, "product_reference": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64" }, "product_reference": "cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-3.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src" }, "product_reference": "cri-tools-0:1.18.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64" }, "product_reference": "cri-tools-0:1.18.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src" }, "product_reference": "jq-0:1.6-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64" }, "product_reference": "jq-0:1.6-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debuginfo-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64" }, "product_reference": "jq-debuginfo-0:1.6-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-devel-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64" }, "product_reference": "jq-devel-0:1.6-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "oniguruma-0:5.9.2-5.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src" }, "product_reference": "oniguruma-0:5.9.2-5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "oniguruma-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64" }, "product_reference": "oniguruma-0:5.9.2-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64" }, "product_reference": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "oniguruma-devel-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64" }, "product_reference": "oniguruma-devel-0:5.9.2-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src" }, "product_reference": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch" }, "product_reference": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src" }, "product_reference": "openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-boto3-0:1.4.0-1.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src" }, "product_reference": "python-boto3-0:1.4.0-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-botocore-0:1.4.57-5.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src" }, "product_reference": "python-botocore-0:1.4.57-5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-s3transfer-0:0.1.3-1.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src" }, "product_reference": "python-s3transfer-0:0.1.3-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python2-boto3-0:1.4.0-1.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch" }, "product_reference": "python2-boto3-0:1.4.0-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python2-botocore-0:1.4.57-5.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch" }, "product_reference": "python2-botocore-0:1.4.57-5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python2-s3transfer-0:0.1.3-1.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch" }, "product_reference": "python2-s3transfer-0:0.1.3-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-2:2.6.0-28.el8_2.2.src as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src" }, "product_reference": "s390utils-2:2.6.0-28.el8_2.2.src", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-base-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-base-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x as a component of Red Hat OpenShift Container Platform 4.6 for System Z over RHEL 8", "product_id": "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x" }, "product_reference": "s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6-FOR-SYSTEM-Z" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.22.8-6.el8_2.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src" }, "product_reference": "NetworkManager-1:1.22.8-6.el8_2.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch" }, "product_reference": "NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch" }, "product_reference": "NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch" }, "product_reference": "NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le" }, "product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x" }, "product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64" }, "product_reference": "afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le" }, "product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x" }, "product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64" }, "product_reference": "afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch" }, "product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src" }, "product_reference": "ansible-runner-0:1.4.6-2.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch" }, "product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-http-0:1.0.0-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src" }, "product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x" }, "product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x" }, "product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-8.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src" }, "product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x" }, "product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x" }, "product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x" }, "product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64" }, "product_reference": "buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch" }, "product_reference": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src" }, "product_reference": "console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch" }, "product_reference": "console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch" }, "product_reference": "console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch" }, "product_reference": "container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src" }, "product_reference": "container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le" }, "product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x" }, "product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src" }, "product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64" }, "product_reference": "coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le" }, "product_reference": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x" }, "product_reference": "coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le" }, "product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x" }, "product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64" }, "product_reference": "coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le" }, "product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x" }, "product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64" }, "product_reference": "coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le" }, "product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x" }, "product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src" }, "product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64" }, "product_reference": "cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le" }, "product_reference": "cri-tools-0:1.18.0-3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x" }, "product_reference": "cri-tools-0:1.18.0-3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-3.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src" }, "product_reference": "cri-tools-0:1.18.0-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64" }, "product_reference": "cri-tools-0:1.18.0-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le" }, "product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.18.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x" }, "product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64" }, "product_reference": "cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-0:049-75.git20200422.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src" }, "product_reference": "dracut-0:049-75.git20200422.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-caps-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-caps-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-caps-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-caps-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-caps-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-caps-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-generic-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-config-generic-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-generic-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-config-generic-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-rescue-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debuginfo-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debugsource-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-debugsource-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debugsource-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-debugsource-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-live-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-live-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-live-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-live-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-live-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-live-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-network-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-network-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-network-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-network-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-network-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-network-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-squash-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-squash-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-squash-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-squash-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-squash-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-squash-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-tools-0:049-75.git20200422.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le" }, "product_reference": "dracut-tools-0:049-75.git20200422.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-tools-0:049-75.git20200422.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x" }, "product_reference": "dracut-tools-0:049-75.git20200422.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-tools-0:049-75.git20200422.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64" }, "product_reference": "dracut-tools-0:049-75.git20200422.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le" }, "product_reference": "faq-0:0.0.6-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x" }, "product_reference": "faq-0:0.0.6-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src" }, "product_reference": "faq-0:0.0.6-4.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64" }, "product_reference": "faq-0:0.0.6-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le" }, "product_reference": "gperftools-0:2.6.3-2.el8+7.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x" }, "product_reference": "gperftools-0:2.6.3-2.el8+7.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-0:2.6.3-2.el8+7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src" }, "product_reference": "gperftools-0:2.6.3-2.el8+7.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64" }, "product_reference": "gperftools-0:2.6.3-2.el8+7.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le" }, "product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x" }, "product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64" }, "product_reference": "gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le" }, "product_reference": "gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-devel-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x" }, "product_reference": "gperftools-devel-0:2.6.3-2.el8+7.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-devel-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64" }, "product_reference": "gperftools-devel-0:2.6.3-2.el8+7.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le" }, "product_reference": "gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x" }, "product_reference": "gperftools-libs-0:2.6.3-2.el8+7.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64" }, "product_reference": "gperftools-libs-0:2.6.3-2.el8+7.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le" }, "product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x" }, "product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64" }, "product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-0:1.18.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src" }, "product_reference": "grpc-0:1.18.0-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-cli-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-cli-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-cli-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-devel-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-devel-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-devel-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-devel-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-devel-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-plugins-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-plugins-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-0:2.0.16-3.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src" }, "product_reference": "haproxy-0:2.0.16-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le" }, "product_reference": "haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x" }, "product_reference": "haproxy-debugsource-0:2.0.16-3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64" }, "product_reference": "haproxy-debugsource-0:2.0.16-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le" }, "product_reference": "haproxy20-0:2.0.16-3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x" }, "product_reference": "haproxy20-0:2.0.16-3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64" }, "product_reference": "haproxy20-0:2.0.16-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le" }, "product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x" }, "product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64" }, "product_reference": "haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src" }, "product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le" }, "product_reference": "inotify-tools-0:3.20.1-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x" }, "product_reference": "inotify-tools-0:3.20.1-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-0:3.20.1-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src" }, "product_reference": "inotify-tools-0:3.20.1-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64" }, "product_reference": "inotify-tools-0:3.20.1-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le" }, "product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x" }, "product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64" }, "product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le" }, "product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x" }, "product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64" }, "product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le" }, "product_reference": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-devel-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x" }, "product_reference": "inotify-tools-devel-0:3.20.1-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64" }, "product_reference": "inotify-tools-devel-0:3.20.1-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch" }, "product_reference": "iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch" }, "product_reference": "iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch" }, "product_reference": "iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch" }, "product_reference": "iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch" }, "product_reference": "iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch" }, "product_reference": "iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch" }, "product_reference": "iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch" }, "product_reference": "iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch" }, "product_reference": "iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch" }, "product_reference": "iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch" }, "product_reference": "iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch" }, "product_reference": "iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch" }, "product_reference": "iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch" }, "product_reference": "iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch" }, "product_reference": "iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch" }, "product_reference": "iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.235.5.1600670743-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch" }, "product_reference": "jenkins-0:2.235.5.1600670743-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.235.5.1600670743-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src" }, "product_reference": "jenkins-0:2.235.5.1600670743-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le" }, "product_reference": "jq-0:1.6-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x" }, "product_reference": "jq-0:1.6-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src" }, "product_reference": "jq-0:1.6-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64" }, "product_reference": "jq-0:1.6-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debuginfo-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le" }, "product_reference": "jq-debuginfo-0:1.6-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debuginfo-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x" }, "product_reference": "jq-debuginfo-0:1.6-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debuginfo-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64" }, "product_reference": "jq-debuginfo-0:1.6-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debugsource-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le" }, "product_reference": "jq-debugsource-0:1.6-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debugsource-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x" }, "product_reference": "jq-debugsource-0:1.6-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debugsource-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64" }, "product_reference": "jq-debugsource-0:1.6-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-devel-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le" }, "product_reference": "jq-devel-0:1.6-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-devel-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x" }, "product_reference": "jq-devel-0:1.6-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "jq-devel-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64" }, "product_reference": "jq-devel-0:1.6-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src" }, "product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src" }, "product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64" }, "product_reference": "kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch" }, "product_reference": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch" }, "product_reference": "libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch" }, "product_reference": "libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch" }, "product_reference": "libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch" }, "product_reference": "libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le" }, "product_reference": "libnftnl-0:1.1.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x" }, "product_reference": "libnftnl-0:1.1.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-0:1.1.5-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src" }, "product_reference": "libnftnl-0:1.1.5-4.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64" }, "product_reference": "libnftnl-0:1.1.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le" }, "product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x" }, "product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64" }, "product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le" }, "product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x" }, "product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64" }, "product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le" }, "product_reference": "libnftnl-devel-0:1.1.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-devel-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x" }, "product_reference": "libnftnl-devel-0:1.1.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-devel-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64" }, "product_reference": "libnftnl-devel-0:1.1.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-4.5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src" }, "product_reference": "libsodium-0:1.0.16-4.5.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le" }, "product_reference": "libunwind-0:1.2.1-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-0:1.2.1-5.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src" }, "product_reference": "libunwind-0:1.2.1-5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64" }, "product_reference": "libunwind-0:1.2.1-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le" }, "product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64" }, "product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le" }, "product_reference": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64" }, "product_reference": "libunwind-debugsource-0:1.2.1-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-devel-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le" }, "product_reference": "libunwind-devel-0:1.2.1-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-devel-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64" }, "product_reference": "libunwind-devel-0:1.2.1-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch" }, "product_reference": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src" }, "product_reference": "linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le" }, "product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x" }, "product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src" }, "product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64" }, "product_reference": "machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le" }, "product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x" }, "product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64" }, "product_reference": "network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le" }, "product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x" }, "product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src" }, "product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64" }, "product_reference": "nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le" }, "product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x" }, "product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64" }, "product_reference": "nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le" }, "product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x" }, "product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64" }, "product_reference": "nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src" }, "product_reference": "openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le" }, "product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x" }, "product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64" }, "product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src" }, "product_reference": "openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le" }, "product_reference": "openssl-1:1.1.1c-15.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x" }, "product_reference": "openssl-1:1.1.1c-15.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-15.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src" }, "product_reference": "openssl-1:1.1.1c-15.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64" }, "product_reference": "openssl-1:1.1.1c-15.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x" }, "product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64" }, "product_reference": "openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le" }, "product_reference": "openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x" }, "product_reference": "openssl-debugsource-1:1.1.1c-15.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64" }, "product_reference": "openssl-debugsource-1:1.1.1c-15.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le" }, "product_reference": "openssl-devel-1:1.1.1c-15.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x" }, "product_reference": "openssl-devel-1:1.1.1c-15.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64" }, "product_reference": "openssl-devel-1:1.1.1c-15.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le" }, "product_reference": "openssl-libs-1:1.1.1c-15.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x" }, "product_reference": "openssl-libs-1:1.1.1c-15.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64" }, "product_reference": "openssl-libs-1:1.1.1c-15.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le" }, "product_reference": "openssl-perl-1:1.1.1c-15.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x" }, "product_reference": "openssl-perl-1:1.1.1c-15.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64" }, "product_reference": "openssl-perl-1:1.1.1c-15.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.1.1c-15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le" }, "product_reference": "openssl-static-1:1.1.1c-15.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.1.1c-15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x" }, "product_reference": "openssl-static-1:1.1.1c-15.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.1.1c-15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64" }, "product_reference": "openssl-static-1:1.1.1c-15.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src" }, "product_reference": "openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch" }, "product_reference": "openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch" }, "product_reference": "openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch" }, "product_reference": "openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch" }, "product_reference": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src" }, "product_reference": "openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch" }, "product_reference": "openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch" }, "product_reference": "openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch" }, "product_reference": "openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch" }, "product_reference": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src" }, "product_reference": "openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le" }, "product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x" }, "product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-0:2.13.0-52.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src" }, "product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64" }, "product_reference": "openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le" }, "product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x" }, "product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64" }, "product_reference": "openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le" }, "product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x" }, "product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64" }, "product_reference": "openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le" }, "product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x" }, "product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64" }, "product_reference": "openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch" }, "product_reference": "openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le" }, "product_reference": "ostree-0:2020.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x" }, "product_reference": "ostree-0:2020.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-0:2020.5-4.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src" }, "product_reference": "ostree-0:2020.5-4.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64" }, "product_reference": "ostree-0:2020.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debuginfo-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le" }, "product_reference": "ostree-debuginfo-0:2020.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debuginfo-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x" }, "product_reference": "ostree-debuginfo-0:2020.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debuginfo-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64" }, "product_reference": "ostree-debuginfo-0:2020.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debugsource-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le" }, "product_reference": "ostree-debugsource-0:2020.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debugsource-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x" }, "product_reference": "ostree-debugsource-0:2020.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debugsource-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64" }, "product_reference": "ostree-debugsource-0:2020.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-devel-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le" }, "product_reference": "ostree-devel-0:2020.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-devel-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x" }, "product_reference": "ostree-devel-0:2020.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-devel-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64" }, "product_reference": "ostree-devel-0:2020.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-grub2-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le" }, "product_reference": "ostree-grub2-0:2020.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-grub2-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64" }, "product_reference": "ostree-grub2-0:2020.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le" }, "product_reference": "ostree-libs-0:2020.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x" }, "product_reference": "ostree-libs-0:2020.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64" }, "product_reference": "ostree-libs-0:2020.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le" }, "product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x" }, "product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64" }, "product_reference": "ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le" }, "product_reference": "ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x" }, "product_reference": "ovn2.13-0:20.09.0-1.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.09.0-1.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src" }, "product_reference": "ovn2.13-0:20.09.0-1.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64" }, "product_reference": "ovn2.13-0:20.09.0-1.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le" }, "product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x" }, "product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64" }, "product_reference": "ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le" }, "product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x" }, "product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64" }, "product_reference": "ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le" }, "product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x" }, "product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64" }, "product_reference": "ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le" }, "product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x" }, "product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64" }, "product_reference": "ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le" }, "product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x" }, "product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64" }, "product_reference": "ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le" }, "product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x" }, "product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64" }, "product_reference": "ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le" }, "product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x" }, "product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64" }, "product_reference": "ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "pprof-0:2.6.3-2.el8+7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch" }, "product_reference": "pprof-0:2.6.3-2.el8+7.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-0:3.6.1-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src" }, "product_reference": "protobuf-0:3.6.1-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-devel-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-devel-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-lite-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-lite-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-static-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-static-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-static-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-vim-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch" }, "product_reference": "protobuf-vim-0:3.6.1-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-alembic-0:1.4.2-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src" }, "product_reference": "python-alembic-0:1.4.2-5.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-boto3-0:1.9.101-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src" }, "product_reference": "python-boto3-0:1.9.101-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-botocore-0:1.12.119-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src" }, "product_reference": "python-botocore-0:1.12.119-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-cachetools-0:3.1.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src" }, "product_reference": "python-cachetools-0:3.1.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-certifi-0:2018.10.15-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src" }, "product_reference": "python-certifi-0:2018.10.15-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-construct-0:2.10.56-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src" }, "product_reference": "python-construct-0:2.10.56-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-daemon-0:2.1.2-9.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src" }, "product_reference": "python-daemon-0:2.1.2-9.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-dictdiffer-0:0.7.1-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src" }, "product_reference": "python-dictdiffer-0:0.7.1-2.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-flask-1:1.1.1-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src" }, "product_reference": "python-flask-1:1.1.1-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-flask-doc-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch" }, "product_reference": "python-flask-doc-1:1.1.1-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-google-auth-0:1.3.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src" }, "product_reference": "python-google-auth-0:1.3.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-ifaddr-0:0.1.6-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src" }, "product_reference": "python-ifaddr-0:0.1.6-5.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src" }, "product_reference": "python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src" }, "product_reference": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-kubernetes-0:11.0.0-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src" }, "product_reference": "python-kubernetes-0:11.0.0-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src" }, "product_reference": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-lockfile-1:0.11.0-8.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src" }, "product_reference": "python-lockfile-1:0.11.0-8.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-openshift-1:0.11.2-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src" }, "product_reference": "python-openshift-1:0.11.2-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src" }, "product_reference": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src" }, "product_reference": "python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch" }, "product_reference": "python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src" }, "product_reference": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch" }, "product_reference": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-pbr-0:5.4.3-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src" }, "product_reference": "python-pbr-0:5.4.3-2.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-pexpect-0:4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src" }, "product_reference": "python-pexpect-0:4.6-2.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-0:5.6.6-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src" }, "product_reference": "python-psutil-0:5.6.6-1.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le" }, "product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x" }, "product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64" }, "product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyroute2-0:0.5.3-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src" }, "product_reference": "python-pyroute2-0:0.5.3-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src" }, "product_reference": "python-requests-unixsocket-0:0.1.5-5.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-rsa-0:4.6-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src" }, "product_reference": "python-rsa-0:4.6-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src" }, "product_reference": "python-ruamel-yaml-0:0.15.41-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le" }, "product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x" }, "product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64" }, "product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-s3transfer-0:0.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src" }, "product_reference": "python-s3transfer-0:0.2.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-string_utils-0:0.6.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src" }, "product_reference": "python-string_utils-0:0.6.0-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src" }, "product_reference": "python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src" }, "product_reference": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-tenacity-0:6.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src" }, "product_reference": "python-tenacity-0:6.2.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src" }, "product_reference": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-websocket-client-0:0.54.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src" }, "product_reference": "python-websocket-client-0:0.54.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-werkzeug-0:1.0.1-3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src" }, "product_reference": "python-werkzeug-0:1.0.1-3.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-zeroconf-0:0.24.4-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src" }, "product_reference": "python-zeroconf-0:0.24.4-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python2-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch" }, "product_reference": "python2-botocore-0:1.12.119-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python2-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch" }, "product_reference": "python2-cachetools-0:3.1.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-alembic-0:1.4.2-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch" }, "product_reference": "python3-alembic-0:1.4.2-5.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch" }, "product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-boto3-0:1.9.101-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch" }, "product_reference": "python3-boto3-0:1.9.101-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch" }, "product_reference": "python3-botocore-0:1.12.119-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch" }, "product_reference": "python3-cachetools-0:3.1.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-certifi-0:2018.10.15-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch" }, "product_reference": "python3-certifi-0:2018.10.15-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-construct-0:2.10.56-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch" }, "product_reference": "python3-construct-0:2.10.56-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-daemon-0:2.1.2-9.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch" }, "product_reference": "python3-daemon-0:2.1.2-9.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch" }, "product_reference": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-flask-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch" }, "product_reference": "python3-flask-1:1.1.1-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-google-auth-0:1.3.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch" }, "product_reference": "python3-google-auth-0:1.3.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x" }, "product_reference": "python3-grpcio-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "python3-grpcio-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x" }, "product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch" }, "product_reference": "python3-ifaddr-0:0.1.6-5.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch" }, "product_reference": "python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch" }, "product_reference": "python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch" }, "product_reference": "python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch" }, "product_reference": "python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch" }, "product_reference": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kubernetes-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch" }, "product_reference": "python3-kubernetes-0:11.0.0-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch" }, "product_reference": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch" }, "product_reference": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch" }, "product_reference": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-lockfile-1:0.11.0-8.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch" }, "product_reference": "python3-lockfile-1:0.11.0-8.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openshift-1:0.11.2-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch" }, "product_reference": "python3-openshift-1:0.11.2-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch" }, "product_reference": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch" }, "product_reference": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch" }, "product_reference": "python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch" }, "product_reference": "python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch" }, "product_reference": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch" }, "product_reference": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pbr-0:5.4.3-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch" }, "product_reference": "python3-pbr-0:5.4.3-2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pexpect-0:4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch" }, "product_reference": "python3-pexpect-0:4.6-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-protobuf-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch" }, "product_reference": "python3-protobuf-0:3.6.1-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le" }, "product_reference": "python3-psutil-0:5.6.6-1.el8ar.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x" }, "product_reference": "python3-psutil-0:5.6.6-1.el8ar.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64" }, "product_reference": "python3-psutil-0:5.6.6-1.el8ar.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le" }, "product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x" }, "product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64" }, "product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyroute2-0:0.5.3-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch" }, "product_reference": "python3-pyroute2-0:0.5.3-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch" }, "product_reference": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rsa-0:4.6-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch" }, "product_reference": "python3-rsa-0:4.6-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le" }, "product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x" }, "product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64" }, "product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le" }, "product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x" }, "product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64" }, "product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch" }, "product_reference": "python3-s3transfer-0:0.2.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-string_utils-0:0.6.0-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch" }, "product_reference": "python3-string_utils-0:0.6.0-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch" }, "product_reference": "python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch" }, "product_reference": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch" }, "product_reference": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch" }, "product_reference": "python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-tenacity-0:6.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch" }, "product_reference": "python3-tenacity-0:6.2.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch" }, "product_reference": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch" }, "product_reference": "python3-websocket-client-0:0.54.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch" }, "product_reference": "python3-werkzeug-0:1.0.1-3.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch" }, "product_reference": "python3-zeroconf-0:0.24.4-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:46.82-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le" }, "product_reference": "redhat-release-coreos-0:46.82-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:46.82-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x" }, "product_reference": "redhat-release-coreos-0:46.82-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:46.82-2.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src" }, "product_reference": "redhat-release-coreos-0:46.82-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:46.82-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64" }, "product_reference": "redhat-release-coreos-0:46.82-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch" }, "product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src" }, "product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src" }, "product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le" }, "product_reference": "rpm-ostree-0:2020.4-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x" }, "product_reference": "rpm-ostree-0:2020.4-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-0:2020.4-1.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src" }, "product_reference": "rpm-ostree-0:2020.4-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64" }, "product_reference": "rpm-ostree-0:2020.4-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le" }, "product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x" }, "product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64" }, "product_reference": "rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le" }, "product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x" }, "product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64" }, "product_reference": "rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le" }, "product_reference": "rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-devel-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x" }, "product_reference": "rpm-ostree-devel-0:2020.4-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-devel-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64" }, "product_reference": "rpm-ostree-devel-0:2020.4-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le" }, "product_reference": "rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x" }, "product_reference": "rpm-ostree-libs-0:2020.4-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64" }, "product_reference": "rpm-ostree-libs-0:2020.4-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le" }, "product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x" }, "product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64" }, "product_reference": "rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" }, "product_reference": "runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src" }, "product_reference": "rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le" }, "product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x" }, "product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64" }, "product_reference": "rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.16.1-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le" }, "product_reference": "tini-0:0.16.1-1.el8ar.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.16.1-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x" }, "product_reference": "tini-0:0.16.1-1.el8ar.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.16.1-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src" }, "product_reference": "tini-0:0.16.1-1.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.16.1-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64" }, "product_reference": "tini-0:0.16.1-1.el8ar.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch" }, "product_reference": "toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-1.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src" }, "product_reference": "toolbox-0:0.0.8-1.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Wouter ter Maat" ], "organization": "Offensi", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8559", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2020-06-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src", "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src", "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src", "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src", "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1851422" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Kubernetes API server, where it allows an attacker to escalate their privileges from a compromised node. This flaw allows an attacker who can intercept requests on a compromised node, to redirect those requests, along with their credentials, to perform actions on other endpoints that trust those credentials (including other clusters), allowing for escalation of privileges. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: compromised node could escalate to cluster level privileges", "title": "Vulnerability summary" }, { "category": "other", "text": "Kubernetes is embedded in the version of heketi shipped with Red Hat Gluster Storage 3. However, it does not use Kubernetes API server part and only uses client side bits. Hence, this flaw does not affect heketi.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src", "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src", "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src", "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src", "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8559" }, { "category": "external", "summary": "RHBZ#1851422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851422" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8559", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8559" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8559" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs", "url": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs" } ], "release_date": "2020-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:47:06+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:4197" }, { "category": "workaround", "details": "No mitigation is known.", "product_ids": [ "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src", "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src", "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src", "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src", "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: compromised node could escalate to cluster level privileges" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src", "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src", "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src", "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src", "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src", "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src", "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src", "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src", "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:47:06+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:4197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src", "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src", "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src", "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src", "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-113.rhaos4.6.git97d715e.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.6:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.6:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.6:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202010011112.p0.git.0.f35f5eb.el7.noarch", "7Server-RH7-RHOSE-4.6:python-boto3-0:1.4.0-1.el7.src", "7Server-RH7-RHOSE-4.6:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.6:python-s3transfer-0:0.1.3-1.el7.src", "7Server-RH7-RHOSE-4.6:python2-boto3-0:1.4.0-1.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.6:python2-s3transfer-0:0.1.3-1.el7.noarch", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-2:2.6.0-28.el8_2.2.src", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-base-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cmsfs-fuse-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpacfstatsd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-cpuplugd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-debugsource-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-devel-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-hmcdrvfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-iucvterm-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-mon_statd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-osasnmpd-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-zdsfs-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6-FOR-SYSTEM-Z:s390utils-ziomon-debuginfo-2:2.6.0-28.el8_2.2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.src", "8Base-RHOSE-4.6:NetworkManager-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-adsl-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-bluetooth-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-cloud-setup-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-config-connectivity-redhat-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-config-server-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-debugsource-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-dispatcher-routing-rules-1:1.22.8-6.el8_2.noarch", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-libnm-devel-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ovs-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-ppp-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-team-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-tui-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wifi-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.ppc64le", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.s390x", "8Base-RHOSE-4.6:NetworkManager-wwan-debuginfo-1:1.22.8-6.el8_2.x86_64", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:afterburn-debuginfo-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.6:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.src", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.ppc64le", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.s390x", "8Base-RHOSE-4.6:atomic-enterprise-service-catalog-svcat-1:4.6.0-202007100531.p0.git.1808.4843b08.el8.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202010011936.p0.git.15.36f28b7.el8.x86_64", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:bpftool-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.src", "8Base-RHOSE-4.6:buildah-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-debugsource-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:buildah-tests-debuginfo-0:1.11.6-8.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-0:0.19-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:console-login-helper-messages-issuegen-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:console-login-helper-messages-profile-0:0.19-3.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:container-selinux-2:2.144.0-1.rhaos4.6.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.6:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.src", "8Base-RHOSE-4.6:coreos-installer-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-bootinfra-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debuginfo-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:coreos-installer-debugsource-0:0.6.0-3.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.0-20.rhaos4.6.git97d715e.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.src", "8Base-RHOSE-4.6:cri-tools-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debuginfo-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.ppc64le", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.s390x", "8Base-RHOSE-4.6:cri-tools-debugsource-0:1.18.0-3.el8.x86_64", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.src", "8Base-RHOSE-4.6:dracut-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-caps-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-generic-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-config-rescue-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debuginfo-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-debugsource-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-live-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-network-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-squash-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.ppc64le", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.s390x", "8Base-RHOSE-4.6:dracut-tools-0:049-75.git20200422.el8.x86_64", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.ppc64le", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.s390x", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.src", "8Base-RHOSE-4.6:faq-0:0.0.6-4.el8.x86_64", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.6:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.src", "8Base-RHOSE-4.6:gperftools-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-debugsource-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-devel-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.ppc64le", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.s390x", "8Base-RHOSE-4.6:gperftools-libs-debuginfo-0:2.6.3-2.el8+7.x86_64", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.6:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:haproxy-0:2.0.16-3.el8.src", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy-debugsource-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.ppc64le", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.s390x", "8Base-RHOSE-4.6:haproxy20-debuginfo-0:2.0.16-3.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.6:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.6:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.6:iwl100-firmware-0:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl1000-firmware-1:39.31.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl105-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl135-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2000-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl2030-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3160-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl3945-firmware-0:15.32.2.9-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl4965-firmware-0:228.61.2.24-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5000-firmware-0:8.83.5.1_1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl5150-firmware-0:8.24.2.2-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000-firmware-0:9.221.4.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2a-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6000g2b-firmware-0:18.168.6.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl6050-firmware-0:41.28.5.1-98.el8.1.noarch", "8Base-RHOSE-4.6:iwl7260-firmware-1:25.30.13.0-98.el8.1.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.noarch", "8Base-RHOSE-4.6:jenkins-0:2.235.5.1600670743-1.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.6:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.6:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-abi-whitelists-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-cross-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-core-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debug-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-debuginfo-common-ppc64le-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-debuginfo-common-s390x-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-debuginfo-common-x86_64-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-doc-0:4.18.0-193.24.1.el8_2.dt1.noarch", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-headers-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-ipaclones-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.src", "8Base-RHOSE-4.6:kernel-rt-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-core-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debug-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-devel-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-kvm-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-extra-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-modules-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-rt-selftests-internal-0:4.18.0-193.24.1.rt13.74.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-selftests-internal-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-tools-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:kernel-tools-libs-devel-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:kernel-zfcpdump-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-core-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-devel-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-extra-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kernel-zfcpdump-modules-internal-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:libertas-sd8686-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-sd8787-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-firmware-2:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libertas-usb8388-olpc-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.6:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.6:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.6:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.6:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.6:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.6:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.noarch", "8Base-RHOSE-4.6:linux-firmware-0:20200512-98.gitb2cad6a2.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.ppc64le", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.s390x", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.src", "8Base-RHOSE-4.6:machine-config-daemon-0:4.6.0-202007100531.p0.git.2669.abe1720.el8.x86_64", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:network-scripts-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.src", "8Base-RHOSE-4.6:nss-altfiles-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debuginfo-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.s390x", "8Base-RHOSE-4.6:nss-altfiles-debugsource-0:2.18.1-12.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.6:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.6:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.6:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.src", "8Base-RHOSE-4.6:openssl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-debugsource-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-devel-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-libs-debuginfo-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-perl-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.ppc64le", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.s390x", "8Base-RHOSE-4.6:openssl-static-1:1.1.1c-15.el8.x86_64", "8Base-RHOSE-4.6:openstack-ironic-1:15.2.1-0.20200929104811.fb90ed4.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-api-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-common-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-conductor-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.src", "8Base-RHOSE-4.6:openstack-ironic-inspector-api-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-conductor-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-inspector-dnsmasq-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:openstack-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.src", "8Base-RHOSE-4.6:openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-debugsource-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:openvswitch2.13-devel-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:openvswitch2.13-test-0:2.13.0-52.el8fdp.noarch", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.src", "8Base-RHOSE-4.6:ostree-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-debugsource-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-devel-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-grub2-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.ppc64le", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.s390x", "8Base-RHOSE-4.6:ostree-libs-debuginfo-0:2020.5-4.el8.x86_64", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.src", "8Base-RHOSE-4.6:ovn2.13-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-central-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-debugsource-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-host-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.ppc64le", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.s390x", "8Base-RHOSE-4.6:ovn2.13-vtep-debuginfo-0:20.09.0-1.el8fdp.x86_64", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:pprof-0:2.6.3-2.el8+7.noarch", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.6:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.6:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.6:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.6:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.6:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.6:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.6:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.6:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.6:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.6:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.6:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.6:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.6:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.6:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.6:python-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.src", "8Base-RHOSE-4.6:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.6:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.6:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.6:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.6:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.6:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.src", "8Base-RHOSE-4.6:python-oslo-concurrency-lang-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.6:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.6:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.6:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python-pyroute2-0:0.5.3-4.el8ost.src", "8Base-RHOSE-4.6:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.6:python-rsa-0:4.6-1.el8.src", "8Base-RHOSE-4.6:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.6:python-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.src", "8Base-RHOSE-4.6:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.6:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.6:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.6:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.6:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.6:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.6:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.6:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-inspector-tests-0:10.2.1-0.20200727083213.9ecb6e3.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-lib-0:4.3.0-0.20200605221931.df238ba.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-python-agent-0:6.3.1-0.20200918042952.9dd968f.el8ost.noarch", "8Base-RHOSE-4.6:python3-ironic-tests-1:15.2.1-0.20200929104811.fb90ed4.el8ost.noarch", "8Base-RHOSE-4.6:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.6:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202010011649.p0.git.2200.e296ba5.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.6:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.6:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.ppc64le", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.s390x", "8Base-RHOSE-4.6:python3-openvswitch2.13-debuginfo-0:2.13.0-52.el8fdp.x86_64", "8Base-RHOSE-4.6:python3-oslo-concurrency-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-concurrency-tests-0:4.2.0-0.20200708091908.35e4df4.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.6:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.ppc64le", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.s390x", "8Base-RHOSE-4.6:python3-perf-debuginfo-0:4.18.0-193.24.1.el8_2.dt1.x86_64", "8Base-RHOSE-4.6:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.6:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.6:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.6:python3-pyroute2-0:0.5.3-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.6:python3-rsa-0:4.6-1.el8.noarch", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.6:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.6:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.6:python3-sushy-tests-0:3.3.0-0.20200804091926.0dfe74a.el8ost.noarch", "8Base-RHOSE-4.6:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.6:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.6:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.6:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.ppc64le", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.s390x", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.src", "8Base-RHOSE-4.6:redhat-release-coreos-0:46.82-2.el8.x86_64", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.6:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.6:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.src", "8Base-RHOSE-4.6:rpm-ostree-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-debugsource-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-devel-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.ppc64le", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.s390x", "8Base-RHOSE-4.6:rpm-ostree-libs-debuginfo-0:2020.4-1.el8.x86_64", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.src", "8Base-RHOSE-4.6:runc-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debuginfo-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.ppc64le", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.s390x", "8Base-RHOSE-4.6:runc-debugsource-0:1.0.0-81.rhaos4.6.git5b757d4.el8.x86_64", "8Base-RHOSE-4.6:rust-afterburn-0:4.5.0-2.rhaos4.6.el8.src", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.6:rust-afterburn-debugsource-0:4.5.0-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.6:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.noarch", "8Base-RHOSE-4.6:toolbox-0:0.0.8-1.rhaos4.6.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-27T14:47:06+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2020:4197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.src", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el7.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-5.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.src", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202010022112.p0.git.94033.ef41184.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2021_0799
Vulnerability from csaf_redhat
Published
2021-03-10 11:41
Modified
2024-11-24 20:21
Summary
Red Hat Security Advisory: OpenShift Virtualization 2.6.0 security and bug fix update
Notes
Topic
An update is now available for RHEL-8-CNV-2.6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 2.6.0 images:
RHEL-8-CNV-2.6
==============
kubevirt-cpu-node-labeller-container-v2.6.0-5
kubevirt-cpu-model-nfd-plugin-container-v2.6.0-5
node-maintenance-operator-container-v2.6.0-13
kubevirt-vmware-container-v2.6.0-5
virtio-win-container-v2.6.0-5
kubevirt-kvm-info-nfd-plugin-container-v2.6.0-5
bridge-marker-container-v2.6.0-9
kubevirt-template-validator-container-v2.6.0-9
kubevirt-v2v-conversion-container-v2.6.0-6
kubemacpool-container-v2.6.0-13
kubevirt-ssp-operator-container-v2.6.0-40
hyperconverged-cluster-webhook-container-v2.6.0-73
hyperconverged-cluster-operator-container-v2.6.0-73
ovs-cni-plugin-container-v2.6.0-10
cnv-containernetworking-plugins-container-v2.6.0-10
ovs-cni-marker-container-v2.6.0-10
cluster-network-addons-operator-container-v2.6.0-16
hostpath-provisioner-container-v2.6.0-11
hostpath-provisioner-operator-container-v2.6.0-14
vm-import-virtv2v-container-v2.6.0-21
kubernetes-nmstate-handler-container-v2.6.0-19
vm-import-controller-container-v2.6.0-21
vm-import-operator-container-v2.6.0-21
virt-api-container-v2.6.0-111
virt-controller-container-v2.6.0-111
virt-handler-container-v2.6.0-111
virt-operator-container-v2.6.0-111
virt-launcher-container-v2.6.0-111
cnv-must-gather-container-v2.6.0-54
virt-cdi-importer-container-v2.6.0-24
virt-cdi-cloner-container-v2.6.0-24
virt-cdi-controller-container-v2.6.0-24
virt-cdi-uploadserver-container-v2.6.0-24
virt-cdi-apiserver-container-v2.6.0-24
virt-cdi-uploadproxy-container-v2.6.0-24
virt-cdi-operator-container-v2.6.0-24
hco-bundle-registry-container-v2.6.0-582
Security Fix(es):
* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)
* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)
* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)
* containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for RHEL-8-CNV-2.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 2.6.0 images:\n\nRHEL-8-CNV-2.6\n==============\nkubevirt-cpu-node-labeller-container-v2.6.0-5\nkubevirt-cpu-model-nfd-plugin-container-v2.6.0-5\nnode-maintenance-operator-container-v2.6.0-13\nkubevirt-vmware-container-v2.6.0-5\nvirtio-win-container-v2.6.0-5\nkubevirt-kvm-info-nfd-plugin-container-v2.6.0-5\nbridge-marker-container-v2.6.0-9\nkubevirt-template-validator-container-v2.6.0-9\nkubevirt-v2v-conversion-container-v2.6.0-6\nkubemacpool-container-v2.6.0-13\nkubevirt-ssp-operator-container-v2.6.0-40\nhyperconverged-cluster-webhook-container-v2.6.0-73\nhyperconverged-cluster-operator-container-v2.6.0-73\novs-cni-plugin-container-v2.6.0-10\ncnv-containernetworking-plugins-container-v2.6.0-10\novs-cni-marker-container-v2.6.0-10\ncluster-network-addons-operator-container-v2.6.0-16\nhostpath-provisioner-container-v2.6.0-11\nhostpath-provisioner-operator-container-v2.6.0-14\nvm-import-virtv2v-container-v2.6.0-21\nkubernetes-nmstate-handler-container-v2.6.0-19\nvm-import-controller-container-v2.6.0-21\nvm-import-operator-container-v2.6.0-21\nvirt-api-container-v2.6.0-111\nvirt-controller-container-v2.6.0-111\nvirt-handler-container-v2.6.0-111\nvirt-operator-container-v2.6.0-111\nvirt-launcher-container-v2.6.0-111\ncnv-must-gather-container-v2.6.0-54\nvirt-cdi-importer-container-v2.6.0-24\nvirt-cdi-cloner-container-v2.6.0-24\nvirt-cdi-controller-container-v2.6.0-24\nvirt-cdi-uploadserver-container-v2.6.0-24\nvirt-cdi-apiserver-container-v2.6.0-24\nvirt-cdi-uploadproxy-container-v2.6.0-24\nvirt-cdi-operator-container-v2.6.0-24\nhco-bundle-registry-container-v2.6.0-582\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0799", "url": "https://access.redhat.com/errata/RHSA-2021:0799" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1732329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732329" }, { "category": "external", "summary": "1783192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783192" }, { "category": "external", "summary": "1791753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791753" }, { "category": "external", "summary": "1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "1848954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848954" }, { "category": "external", "summary": "1848956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848956" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1853911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853911" }, { "category": "external", "summary": "1854098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854098" }, { "category": "external", "summary": "1856347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856347" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1859235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859235" }, { "category": "external", "summary": "1860714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860714" }, { "category": "external", "summary": "1860992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860992" }, { "category": "external", "summary": "1864577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1864577" }, { "category": "external", "summary": "1866593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866593" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1868817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868817" }, { "category": "external", "summary": "1873771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873771" }, { "category": "external", "summary": "1874812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874812" }, { "category": "external", "summary": "1878499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878499" }, { "category": "external", "summary": "1879108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879108" }, { "category": "external", "summary": "1881874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881874" }, { "category": "external", "summary": "1883232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883232" }, { "category": "external", "summary": "1883371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" }, { "category": "external", "summary": "1885153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885153" }, { "category": "external", "summary": "1885418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885418" }, { "category": "external", "summary": "1887398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887398" }, { "category": "external", "summary": "1889295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889295" }, { "category": "external", "summary": "1891285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891285" }, { "category": "external", "summary": "1891440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891440" }, { "category": "external", "summary": "1892227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892227" }, { "category": "external", "summary": "1893278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893278" }, { "category": "external", "summary": "1893646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893646" }, { "category": "external", "summary": "1894428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894428" }, { "category": "external", "summary": "1894824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894824" }, { "category": "external", "summary": "1894897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894897" }, { "category": "external", "summary": "1895414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895414" }, { "category": "external", "summary": "1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "1898072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898072" }, { "category": "external", "summary": "1898840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898840" }, { "category": "external", "summary": "1899558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899558" }, { "category": "external", "summary": "1901480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901480" }, { "category": "external", "summary": "1902046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902046" }, { "category": "external", "summary": "1902111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" }, { "category": "external", "summary": "1903014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903014" }, { "category": "external", "summary": "1903585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903585" }, { "category": "external", "summary": "1904797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904797" }, { "category": "external", "summary": "1906199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906199" }, { "category": "external", "summary": "1907151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907151" }, { "category": "external", "summary": "1907352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907352" }, { "category": "external", "summary": "1907691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907691" }, { "category": "external", "summary": "1907988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907988" }, { "category": "external", "summary": "1908363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908363" }, { "category": "external", "summary": "1908421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908421" }, { "category": "external", "summary": "1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "1909458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909458" }, { "category": "external", "summary": "1910857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910857" }, { "category": "external", "summary": "1911118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911118" }, { "category": "external", "summary": "1911396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911396" }, { "category": "external", "summary": "1911662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911662" }, { "category": "external", "summary": "1912908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912908" }, { "category": "external", "summary": "1913248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913248" }, { "category": "external", "summary": "1913320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913320" }, { "category": "external", "summary": "1913717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913717" }, { "category": "external", "summary": "1913756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913756" }, { "category": "external", "summary": "1914177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914177" }, { "category": "external", "summary": "1914608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914608" }, { "category": "external", "summary": "1914947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914947" }, { "category": "external", "summary": "1917908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917908" }, { "category": "external", "summary": "1917963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917963" }, { "category": "external", "summary": "1919391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391" }, { "category": "external", "summary": "1920576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920576" }, { "category": "external", "summary": "1920610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920610" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1923979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923979" }, { "category": "external", "summary": "1927373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927373" }, { "category": "external", "summary": "1931376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931376" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0799.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.0 security and bug fix update", "tracking": { "current_release_date": "2024-11-24T20:21:53+00:00", "generator": { "date": "2024-11-24T20:21:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0799", "initial_release_date": "2021-03-10T11:41:12+00:00", "revision_history": [ { "date": "2021-03-10T11:41:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-10T11:41:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:21:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 2.6 for RHEL 8", "product": { "name": "CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "product": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.6.0-25" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product": { "name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_id": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v2.6.0-25" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64" }, "product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "relates_to_product_reference": "8Base-CNV-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-9283", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2020-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1804533" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform uses the vulnerable library in a number of components but strictly as an SSH client. The severity of this vulnerability is reduced for clients as it requires connections to malicious SSH servers, with the maximum impact only a client crash. This vulnerability is rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9283" }, { "category": "external", "summary": "RHBZ#1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY", "url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY" } ], "release_date": "2020-02-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2020-26160", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1883371" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in jwt-go where it is vulnerable to Access Restriction Bypass if m[\"aud\"] happens to be []string{}, as allowed by the spec, the type assertion fails and the value of aud is \"\". This can cause audience verification to succeed even if the audiences being passed are incorrect if required is set to false.", "title": "Vulnerability description" }, { "category": "summary", "text": "jwt-go: access restriction bypass vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The github.com/dgrijalva/jwt-go module is an indirect dependency of the k8s.io/client-go module pulled into Quay Bridge, and Setup operators via the Operator\u0027s SDK generated code. The k8s.io/client-go module does not use jwt-go in an unsafe way [1]. Red Hat Quay components have been marked as wontfix. This may be fixed in the future.\n\nSimilar to Quay, multiple OpenShift Container Platform (OCP) containers include jwt-go as a transient dependency due to go-autorest [1]. As such, those containers do not use jwt-go in an unsafe way. They have been marked wontfix at this time and may be fixed in a future update.\n\nSame as Quay and OpenShift Container Platform, components shipped with Red Hat OpenShift Container Storage 4 do not use jwt-go in an unsafe way and hence this issue has been rated as having a security impact of Low. A future update may address this issue.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli as a technical preview and is not currently planned to be addressed in future updates, hence the multi-cloud-object-gateway-cli package will not be fixed.\n\n[1] https://github.com/Azure/go-autorest/issues/568#issuecomment-703804062", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26160" }, { "category": "external", "summary": "RHBZ#1883371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26160", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515" } ], "release_date": "2020-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jwt-go: access restriction bypass vulnerability" }, { "cve": "CVE-2020-27813", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902111" } ], "notes": [ { "category": "description", "text": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gorilla-websocket: integer overflow leads to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27813" }, { "category": "external", "summary": "RHBZ#1902111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27813", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813" }, { "category": "external", "summary": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh", "url": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh" } ], "release_date": "2019-08-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gorilla-websocket: integer overflow leads to denial of service" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1897635" } ], "notes": [ { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "RHBZ#1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: panic during recursive division of very large numbers" }, { "cve": "CVE-2020-29652", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908883" } ], "notes": [ { "category": "description", "text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference", "title": "Vulnerability summary" }, { "category": "other", "text": "A large number of products include the affected package, but do not make use of the vulnerable SSH server code. Accordingly, the flaw itself is rated as \"Important\", but these products themselves all have a \"Low\" severity rating.\n\nAdditionally, a number of products include golang.org/x/crypto (or even golang.org/x/crypto/ssh/terminal) but not specifically golang.org/x/crypto/ssh/server.go in the final build. As this would result in a very large number of entries of not affected products, only products which include the ssh server code (golang.org/x/crypto/ssh/server.go) have been represented here. \n\nRed Hat Enterprise Linux 8 container-tools:rhel8/containernetworking-plugins is not affected because although it uses some functionality from golang.org/x/crypto, it does not use or import anything from golang.org/x/crypto/ssh/*.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29652" }, { "category": "external", "summary": "RHBZ#1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" } ], "release_date": "2020-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "acknowledgments": [ { "names": [ "Casey Callendrello" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-20206", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919391" } ], "notes": [ { "category": "description", "text": "An improper limitation of path name flaw was found in containernetworking/cni. When specifying the plugin to load in the `type` field in the network configuration, it is possible to use special elements such as \"../\" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as `reboot`. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) does package a vulnerable version of containernetworking/cni, however, the NetworkDefinitionAttachment is defined in code and cannot be easily changed except through a user who has access to the operator namespace such as cluster-admin. As such, for OSSM, the impact is Moderate.\n\nThe fix for podman was released as a part of OpenShift 4.8 and is included in future releases.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20206" }, { "category": "external", "summary": "RHBZ#1919391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20206", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206" } ], "release_date": "2021-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-10T11:41:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration" } ] }
rhsa-2020_4201
Vulnerability from csaf_redhat
Published
2020-10-06 23:52
Modified
2024-11-13 22:15
Summary
Red Hat Security Advisory: OpenShift Virtualization 2.4.2 Images
Notes
Topic
Red Hat OpenShift Virtualization release 2.4.2 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
Security Fix(es):
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Container-native Virtualization 2.4.2 Images (BZ#1877407)
This advisory contains the following OpenShift Virtualization 2.4.2 images:
RHEL-7-CNV-2.4
==============
kubevirt-ssp-operator-container-v2.4.2-2
RHEL-8-CNV-2.4
==============
virt-cdi-controller-container-v2.4.2-1
virt-cdi-apiserver-container-v2.4.2-1
hostpath-provisioner-operator-container-v2.4.2-1
virt-cdi-uploadproxy-container-v2.4.2-1
virt-cdi-cloner-container-v2.4.2-1
virt-cdi-importer-container-v2.4.2-1
kubevirt-template-validator-container-v2.4.2-1
hostpath-provisioner-container-v2.4.2-1
virt-cdi-uploadserver-container-v2.4.2-1
virt-cdi-operator-container-v2.4.2-1
virt-controller-container-v2.4.2-1
kubevirt-cpu-model-nfd-plugin-container-v2.4.2-1
virt-api-container-v2.4.2-1
ovs-cni-marker-container-v2.4.2-1
kubevirt-cpu-node-labeller-container-v2.4.2-1
bridge-marker-container-v2.4.2-1
kubevirt-metrics-collector-container-v2.4.2-1
kubemacpool-container-v2.4.2-1
cluster-network-addons-operator-container-v2.4.2-1
ovs-cni-plugin-container-v2.4.2-1
kubernetes-nmstate-handler-container-v2.4.2-1
cnv-containernetworking-plugins-container-v2.4.2-1
virtio-win-container-v2.4.2-1
virt-handler-container-v2.4.2-1
virt-launcher-container-v2.4.2-1
cnv-must-gather-container-v2.4.2-1
virt-operator-container-v2.4.2-1
vm-import-controller-container-v2.4.2-1
hyperconverged-cluster-operator-container-v2.4.2-1
vm-import-operator-container-v2.4.2-1
kubevirt-vmware-container-v2.4.2-1
kubevirt-v2v-conversion-container-v2.4.2-1
kubevirt-kvm-info-nfd-plugin-container-v2.4.2-1
node-maintenance-operator-container-v2.4.2-1
hco-bundle-registry-container-v2.4.2-15
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 2.4.2 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nSecurity Fix(es):\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Container-native Virtualization 2.4.2 Images (BZ#1877407)\n\nThis advisory contains the following OpenShift Virtualization 2.4.2 images:\n\nRHEL-7-CNV-2.4\n==============\nkubevirt-ssp-operator-container-v2.4.2-2\n\nRHEL-8-CNV-2.4\n==============\nvirt-cdi-controller-container-v2.4.2-1\nvirt-cdi-apiserver-container-v2.4.2-1\nhostpath-provisioner-operator-container-v2.4.2-1\nvirt-cdi-uploadproxy-container-v2.4.2-1\nvirt-cdi-cloner-container-v2.4.2-1\nvirt-cdi-importer-container-v2.4.2-1\nkubevirt-template-validator-container-v2.4.2-1\nhostpath-provisioner-container-v2.4.2-1\nvirt-cdi-uploadserver-container-v2.4.2-1\nvirt-cdi-operator-container-v2.4.2-1\nvirt-controller-container-v2.4.2-1\nkubevirt-cpu-model-nfd-plugin-container-v2.4.2-1\nvirt-api-container-v2.4.2-1\novs-cni-marker-container-v2.4.2-1\nkubevirt-cpu-node-labeller-container-v2.4.2-1\nbridge-marker-container-v2.4.2-1\nkubevirt-metrics-collector-container-v2.4.2-1\nkubemacpool-container-v2.4.2-1\ncluster-network-addons-operator-container-v2.4.2-1\novs-cni-plugin-container-v2.4.2-1\nkubernetes-nmstate-handler-container-v2.4.2-1\ncnv-containernetworking-plugins-container-v2.4.2-1\nvirtio-win-container-v2.4.2-1\nvirt-handler-container-v2.4.2-1\nvirt-launcher-container-v2.4.2-1\ncnv-must-gather-container-v2.4.2-1\nvirt-operator-container-v2.4.2-1\nvm-import-controller-container-v2.4.2-1\nhyperconverged-cluster-operator-container-v2.4.2-1\nvm-import-operator-container-v2.4.2-1\nkubevirt-vmware-container-v2.4.2-1\nkubevirt-v2v-conversion-container-v2.4.2-1\nkubevirt-kvm-info-nfd-plugin-container-v2.4.2-1\nnode-maintenance-operator-container-v2.4.2-1\nhco-bundle-registry-container-v2.4.2-15", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4201", "url": "https://access.redhat.com/errata/RHSA-2020:4201" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1869194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869194" }, { "category": "external", "summary": "1869734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869734" }, { "category": "external", "summary": "1875383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875383" }, { "category": "external", "summary": "1877407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877407" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4201.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 2.4.2 Images", "tracking": { "current_release_date": "2024-11-13T22:15:12+00:00", "generator": { "date": "2024-11-13T22:15:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2020:4201", "initial_release_date": "2020-10-06T23:52:47+00:00", "revision_history": [ { "date": "2020-10-06T23:52:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-06T23:52:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:15:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 2.4 for RHEL 8", "product": { "name": "CNV 2.4 for RHEL 8", "product_id": "8Base-CNV-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:2.4::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.4.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.4.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "product": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.4.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.4.2-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64 as a component of CNV 2.4 for RHEL 8", "product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "relates_to_product_reference": "8Base-CNV-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64 as a component of CNV 2.4 for RHEL 8", "product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "relates_to_product_reference": "8Base-CNV-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64 as a component of CNV 2.4 for RHEL 8", "product_id": "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64" }, "product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "relates_to_product_reference": "8Base-CNV-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64 as a component of CNV 2.4 for RHEL 8", "product_id": "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64", "relates_to_product_reference": "8Base-CNV-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-06T23:52:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4201" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-06T23:52:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4201" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:61d1362613e119b2fc4ef4ee3fa846b0c7e1684df2ebc0202d0a9f8e7f24d714_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:bba80a01ab4472352b31a6e41f07107e0321ede049885f7da143335f009ae746_amd64", "8Base-CNV-2.4:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:b4e9f9b68c77c98c0d9c44abc92a49ffed07308820f5e2424da7975251d5ee0b_amd64", "8Base-CNV-2.4:container-native-virtualization/vm-import-controller-rhel8@sha256:9f33d4f14a55f66359d7967345df4afe2925f23956eb8bf4d571b952199bf185_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" } ] }
rhsa-2021_2122
Vulnerability from csaf_redhat
Published
2021-06-01 04:12
Modified
2024-11-22 17:00
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.7.13 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.7.13 is now available with updates to packages and images that fix several bugs.
This release includes a security update for Red Hat OpenShift Container Platform 4.7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.13. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2021:2121
Security Fix(es):
* jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. (CVE-2021-21642)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
* jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. (CVE-2021-21643)
* jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. (CVE-2021-21644)
* jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. (CVE-2021-21645)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.7.13 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.13. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2021:2121\n\nSecurity Fix(es):\n\n* jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. (CVE-2021-21642)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. (CVE-2021-21643)\n\n* jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. (CVE-2021-21644)\n\n* jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. (CVE-2021-21645)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2122", "url": "https://access.redhat.com/errata/RHSA-2021:2122" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1952146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952146" }, { "category": "external", "summary": "1952148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952148" }, { "category": "external", "summary": "1952151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952151" }, { "category": "external", "summary": "1952152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952152" }, { "category": "external", "summary": "1964770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964770" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2122.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.13 packages and security update", "tracking": { "current_release_date": "2024-11-22T17:00:56+00:00", "generator": { "date": "2024-11-22T17:00:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:2122", "initial_release_date": "2021-06-01T04:12:55+00:00", "revision_history": [ { "date": "2021-06-01T04:12:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-06-01T04:12:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T17:00:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "product": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=src" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.83-2.el8.src", "product": { "name": "redhat-release-coreos-0:47.83-2.el8.src", "product_id": "redhat-release-coreos-0:47.83-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "product_id": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1621361158-1.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "product": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.20.0-3.el7.src", "product": { "name": "cri-tools-0:1.20.0-3.el7.src", "product_id": "cri-tools-0:1.20.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.20.0-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "product": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.83-2.el8.x86_64", "product": { "name": "redhat-release-coreos-0:47.83-2.el8.x86_64", "product_id": "redhat-release-coreos-0:47.83-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "product": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.20.0-3.el7.x86_64", "product": { "name": "cri-tools-0:1.20.0-3.el7.x86_64", "product_id": "cri-tools-0:1.20.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.20.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.20.0-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "product": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.83-2.el8.ppc64le", "product": { "name": "redhat-release-coreos-0:47.83-2.el8.ppc64le", "product_id": "redhat-release-coreos-0:47.83-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "product": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "product_id": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "product_id": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "product_id": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.2-12.rhaos4.7.git9f7be76.el8?arch=s390x" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.83-2.el8.s390x", "product": { "name": "redhat-release-coreos-0:47.83-2.el8.s390x", "product_id": "redhat-release-coreos-0:47.83-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-2.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1621361158-1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src" }, "product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64" }, "product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.20.0-3.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src" }, "product_reference": "cri-tools-0:1.20.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.20.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64" }, "product_reference": "cri-tools-0:1.20.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le" }, "product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x" }, "product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src" }, "product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64" }, "product_reference": "cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.83-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le" }, "product_reference": "redhat-release-coreos-0:47.83-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.83-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x" }, "product_reference": "redhat-release-coreos-0:47.83-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.83-2.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src" }, "product_reference": "redhat-release-coreos-0:47.83-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.83-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" }, "product_reference": "redhat-release-coreos-0:47.83-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T04:12:55+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2122" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T04:12:55+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2122" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2021-21642", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1952146" } ], "notes": [ { "category": "description", "text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin XML parser wasn\u0027t configure to prevent XML external entity (XXE) attacks. An attacker with the ability to define Maven configuration files can use this vulnerability to prepare a crafted configuration file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21642" }, { "category": "external", "summary": "RHBZ#1952146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21642" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2204", "url": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2204" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T04:12:55+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2122" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks." }, { "cve": "CVE-2021-21643", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1952148" } ], "notes": [ { "category": "description", "text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin does not correctly perform permission checks in several HTTP endpoints, as a consequence an attacker with global Job/Configure permission can enumerate system-scoped credentials IDs of credentials stored in Jenkins.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21643" }, { "category": "external", "summary": "RHBZ#1952148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952148" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21643", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21643" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2254", "url": "https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2254" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T04:12:55+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2122" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints." }, { "cve": "CVE-2021-21644", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1952151" } ], "notes": [ { "category": "description", "text": "A cross-site request forgery (CSRF) vulnerability was found in the config-file-provider Jenkins plugin. The plugin does not require POST requests for an HTTP endpoint which allows attackers to delete configuration files corresponding to an attacker-specified ID.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21644" }, { "category": "external", "summary": "RHBZ#1952151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952151" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21644", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21644" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21644", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21644" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T04:12:55+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2122" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability." }, { "cve": "CVE-2021-21645", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1952152" } ], "notes": [ { "category": "description", "text": "A flaw was found in the config-file-provider Jenkins plugin. The plugin does not perform permission checks in several HTTP endpoints, as a consequence an attacker with Overall/Read permission is allowed to enumerate configuration file IDs.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21645" }, { "category": "external", "summary": "RHBZ#1952152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952152" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21645", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21645" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T04:12:55+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2122" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.20.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1621361158-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints." } ] }
wid-sec-w-2023-1599
Vulnerability from csaf_certbund
Published
2021-01-13 23:00
Modified
2023-06-29 22:00
Summary
IBM Security Guardium: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Security Guardium ist eine Lösung für die Überwachung und Auditierung des Datenzugriffs.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Security Guardium ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Security Guardium ist eine L\u00f6sung f\u00fcr die \u00dcberwachung und Auditierung des Datenzugriffs.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Security Guardium ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1599 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-1599.json" }, { "category": "self", "summary": "WID-SEC-2023-1599 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1599" }, { "category": "external", "summary": "IBM Security Bulletin 7008449 vom 2023-06-29", "url": "https://www.ibm.com/support/pages/node/7008449" }, { "category": "external", "summary": "IBM Security Bulletin: 6403463 vom 2021-01-13", "url": "https://www.ibm.com/support/pages/node/6403463" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0521 vom 2021-02-15", "url": "https://access.redhat.com/errata/RHSA-2021:0521" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0548 vom 2021-02-16", "url": "https://access.redhat.com/errata/RHSA-2021:0548" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4758-1 vom 2021-03-09", "url": "https://ubuntu.com/security/notices/USN-4758-1" } ], "source_lang": "en-US", "title": "IBM Security Guardium: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-29T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:33:43.193+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1599", "initial_release_date": "2021-01-13T23:00:00.000+00:00", "revision_history": [ { "date": "2021-01-13T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-02-15T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-02-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-03-08T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM DB2", "product": { "name": "IBM DB2", "product_id": "5104", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:-" } } }, { "category": "product_name", "name": "IBM Security Guardium Insights 2.0.2", "product": { "name": "IBM Security Guardium Insights 2.0.2", "product_id": "316562", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:10.0" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14039", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-14039" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-14145" }, { "cve": "CVE-2020-15168", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-15168" }, { "cve": "CVE-2020-15586", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-15586" }, { "cve": "CVE-2020-15778", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-15778" }, { "cve": "CVE-2020-16845", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-16845" }, { "cve": "CVE-2020-24553", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-24553" }, { "cve": "CVE-2020-4166", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-4166" }, { "cve": "CVE-2020-4594", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-4594" }, { "cve": "CVE-2020-4595", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-4595" }, { "cve": "CVE-2020-4596", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-4596" }, { "cve": "CVE-2020-4597", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-4597" }, { "cve": "CVE-2020-4599", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-4599" }, { "cve": "CVE-2020-4600", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-4600" }, { "cve": "CVE-2020-4602", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-4602" }, { "cve": "CVE-2020-4604", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-4604" }, { "cve": "CVE-2020-7608", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-7608" }, { "cve": "CVE-2020-8244", "notes": [ { "category": "description", "text": "In IBM Security Guardium existieren mehrere Schwachstellen. Die Schwachstellen sind einerseits in verschiedenen Komponenten des Produktes vorhanden sowie im Produkt selbst. Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Angriff zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T000126", "5104", "316562" ] }, "release_date": "2021-01-13T23:00:00Z", "title": "CVE-2020-8244" } ] }
wid-sec-w-2022-1375
Vulnerability from csaf_certbund
Published
2022-09-11 22:00
Modified
2023-09-14 22:00
Summary
JFrog Artifactory: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
JFrog Artifactory ist eine universelle DevOps-Lösung.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in JFrog Artifactory ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JFrog Artifactory ist eine universelle DevOps-L\u00f6sung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in JFrog Artifactory ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1375 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1375.json" }, { "category": "self", "summary": "WID-SEC-2022-1375 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1375" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5165 vom 2023-09-14", "url": "https://access.redhat.com/errata/RHSA-2023:5165" }, { "category": "external", "summary": "JFrog Fixed Security Vulnerabilities vom 2022-09-11", "url": "https://www.jfrog.com/confluence/display/JFROG/Fixed+Security+Vulnerabilities" }, { "category": "external", "summary": "JFrog Fixed Security Vulnerabilities", "url": "https://www.jfrog.com/confluence/display/JFROG/Fixed+Security+Vulnerabilities" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6782 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6782" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5776-1 vom 2022-12-13", "url": "https://ubuntu.com/security/notices/USN-5776-1" } ], "source_lang": "en-US", "title": "JFrog Artifactory: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-09-14T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:58:09.779+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1375", "initial_release_date": "2022-09-11T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-11T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-12T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-12-20T23:00:00.000+00:00", "number": "5", "summary": "Referenz(en) aufgenommen: FEDORA-2022-DB674BAFD9, FEDORA-2022-7E327A20BE" }, { "date": "2023-09-14T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "JFrog Artifactory", "product": { "name": "JFrog Artifactory", "product_id": "T024527", "product_identification_helper": { "cpe": "cpe:/a:jfrog:artifactory:-" } } }, { "category": "product_name", "name": "JFrog Artifactory \u003c 7.46.3", "product": { "name": "JFrog Artifactory \u003c 7.46.3", "product_id": "T024764", "product_identification_helper": { "cpe": "cpe:/a:jfrog:artifactory:7.46.3" } } } ], "category": "product_name", "name": "Artifactory" } ], "category": "vendor", "name": "JFrog" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4517", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2013-4517" }, { "cve": "CVE-2013-7285", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2013-7285" }, { "cve": "CVE-2014-0107", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2014-0107" }, { "cve": "CVE-2014-0114", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2014-0114" }, { "cve": "CVE-2014-3577", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2014-3577" }, { "cve": "CVE-2014-3623", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2014-3623" }, { "cve": "CVE-2015-0227", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2015-0227" }, { "cve": "CVE-2015-2575", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2015-2575" }, { "cve": "CVE-2015-3253", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2015-3253" }, { "cve": "CVE-2015-4852", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2015-4852" }, { "cve": "CVE-2015-7940", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2015-7940" }, { "cve": "CVE-2016-10750", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2016-10750" }, { "cve": "CVE-2016-3092", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2016-3092" }, { "cve": "CVE-2016-3674", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2016-3674" }, { "cve": "CVE-2016-6501", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2016-6501" }, { "cve": "CVE-2016-8735", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2016-8735" }, { "cve": "CVE-2016-8745", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2016-8745" }, { "cve": "CVE-2017-1000487", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2017-1000487" }, { "cve": "CVE-2017-15095", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2017-15095" }, { "cve": "CVE-2017-17485", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2017-17485" }, { "cve": "CVE-2017-18214", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2017-18214" }, { "cve": "CVE-2017-18640", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2017-18640" }, { "cve": "CVE-2017-7525", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2017-7525" }, { "cve": "CVE-2017-7657", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2017-7657" }, { "cve": "CVE-2017-7957", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2017-7957" }, { "cve": "CVE-2017-9506", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2017-9506" }, { "cve": "CVE-2018-1000206", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2018-1000206" }, { "cve": "CVE-2018-9116", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2018-9116" }, { "cve": "CVE-2019-10219", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2019-10219" }, { "cve": "CVE-2019-12402", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2019-12402" }, { "cve": "CVE-2019-17359", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2019-17359" }, { "cve": "CVE-2019-17571", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2019-17571" }, { "cve": "CVE-2019-20104", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2019-20104" }, { "cve": "CVE-2020-11996", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-11996" }, { "cve": "CVE-2020-13934", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-13934" }, { "cve": "CVE-2020-13935", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-13935" }, { "cve": "CVE-2020-13949", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-13949" }, { "cve": "CVE-2020-14340", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-14340" }, { "cve": "CVE-2020-15586", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-15586" }, { "cve": "CVE-2020-1745", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-1745" }, { "cve": "CVE-2020-17521", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-17521" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-28500", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-28500" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-7226", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-7226" }, { "cve": "CVE-2020-7692", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-7692" }, { "cve": "CVE-2020-8203", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2020-8203" }, { "cve": "CVE-2021-13936", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-13936" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-22060", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-22060" }, { "cve": "CVE-2021-22112", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-22112" }, { "cve": "CVE-2021-22119", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-22119" }, { "cve": "CVE-2021-22147", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-22147" }, { "cve": "CVE-2021-22148", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-22148" }, { "cve": "CVE-2021-22149", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-22149" }, { "cve": "CVE-2021-22573", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-22573" }, { "cve": "CVE-2021-23337", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-23337" }, { "cve": "CVE-2021-25122", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-25122" }, { "cve": "CVE-2021-26291", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-26291" }, { "cve": "CVE-2021-27568", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-27568" }, { "cve": "CVE-2021-29505", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-29505" }, { "cve": "CVE-2021-30129", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-30129" }, { "cve": "CVE-2021-33037", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-33037" }, { "cve": "CVE-2021-35550", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35550" }, { "cve": "CVE-2021-35556", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35556" }, { "cve": "CVE-2021-35560", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35560" }, { "cve": "CVE-2021-35561", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35561" }, { "cve": "CVE-2021-35564", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35564" }, { "cve": "CVE-2021-35565", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35565" }, { "cve": "CVE-2021-35567", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35567" }, { "cve": "CVE-2021-35578", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35578" }, { "cve": "CVE-2021-35586", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35586" }, { "cve": "CVE-2021-35588", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35588" }, { "cve": "CVE-2021-35603", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-35603" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3765", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-3765" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-3859", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-3859" }, { "cve": "CVE-2021-41090", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-41090" }, { "cve": "CVE-2021-41091", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-41091" }, { "cve": "CVE-2021-42340", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-42340" }, { "cve": "CVE-2021-42550", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-42550" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2022-0536", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-0536" }, { "cve": "CVE-2022-22963", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-22963" }, { "cve": "CVE-2022-23632", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-23632" }, { "cve": "CVE-2022-23648", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-23648" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24769", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-24769" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-29153", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-29153" }, { "cve": "CVE-2022-32212", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-32212" }, { "cve": "CVE-2022-32213", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-32213" }, { "cve": "CVE-2022-32214", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-32214" }, { "cve": "CVE-2022-32215", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-32215" }, { "cve": "CVE-2022-32223", "notes": [ { "category": "description", "text": "In JFrog Artifactory existieren Zahlreiche Schwachstellen in verschiedenen Komponenten von Drittanbietern. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Zustand auszul\u00f6sen. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T024527", "67646", "T000126", "T024764" ] }, "release_date": "2022-09-11T22:00:00Z", "title": "CVE-2022-32223" } ] }
ghsa-9rmg-8r3f-xrq7
Vulnerability from github
Published
2022-05-24 17:23
Modified
2022-12-03 15:30
Severity ?
Details
Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.
{ "affected": [], "aliases": [ "CVE-2020-15586" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-07-17T16:15:00Z", "severity": "MODERATE" }, "details": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.", "id": "GHSA-9rmg-8r3f-xrq7", "modified": "2022-12-03T15:30:27Z", "published": "2022-05-24T17:23:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "type": "WEB", "url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w" }, { "type": "WEB", "url": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200731-0005" }, { "type": "WEB", "url": "https://www.cloudfoundry.org/blog/cve-2020-15586" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4848" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2020-15586
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-15586", "description": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.", "id": "GSD-2020-15586", "references": [ "https://www.suse.com/security/cve/CVE-2020-15586.html", "https://www.debian.org/security/2021/dsa-4848", "https://access.redhat.com/errata/RHSA-2021:4103", "https://access.redhat.com/errata/RHSA-2021:2122", "https://access.redhat.com/errata/RHSA-2021:1515", "https://access.redhat.com/errata/RHSA-2021:1366", "https://access.redhat.com/errata/RHSA-2021:1016", "https://access.redhat.com/errata/RHSA-2021:0956", "https://access.redhat.com/errata/RHSA-2021:0799", "https://access.redhat.com/errata/RHSA-2021:0713", "https://access.redhat.com/errata/RHSA-2021:0172", "https://access.redhat.com/errata/RHBA-2021:0101", "https://access.redhat.com/errata/RHBA-2021:0075", "https://access.redhat.com/errata/RHSA-2021:0072", "https://access.redhat.com/errata/RHSA-2020:5649", "https://access.redhat.com/errata/RHSA-2020:5606", "https://access.redhat.com/errata/RHSA-2020:5605", "https://access.redhat.com/errata/RHBA-2020:5356", "https://access.redhat.com/errata/RHBA-2020:5123", "https://access.redhat.com/errata/RHSA-2020:5119", "https://access.redhat.com/errata/RHSA-2020:5118", "https://access.redhat.com/errata/RHSA-2020:4297", "https://access.redhat.com/errata/RHBA-2020:4229", "https://access.redhat.com/errata/RHSA-2020:4214", "https://access.redhat.com/errata/RHSA-2020:4201", "https://access.redhat.com/errata/RHBA-2020:4197", "https://access.redhat.com/errata/RHBA-2020:4139", "https://access.redhat.com/errata/RHSA-2020:3665", "https://advisories.mageia.org/CVE-2020-15586.html", "https://alas.aws.amazon.com/cve/html/CVE-2020-15586.html", "https://linux.oracle.com/cve/CVE-2020-15586.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-15586" ], "details": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.", "id": "GSD-2020-15586", "modified": "2023-12-13T01:21:43.476114Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15586", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2020:1087", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" }, { "name": "openSUSE-SU-2020:1095", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" }, { "name": "FEDORA-2020-d75360e2b0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW/" }, { "name": "FEDORA-2020-9cd1204ba0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/" }, { "name": "openSUSE-SU-2020:1405", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" }, { "name": "openSUSE-SU-2020:1407", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html" }, { "name": "DSA-4848", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4848" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w" }, { "name": "https://security.netapp.com/advisory/ntap-20200731-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200731-0005/" }, { "name": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g", "refsource": "MISC", "url": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g" }, { "name": "https://www.cloudfoundry.org/blog/cve-2020-15586/", "refsource": "CONFIRM", "url": "https://www.cloudfoundry.org/blog/cve-2020-15586/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.13.13", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.14.5", "versionStartIncluding": "1.14.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cloudfoundry:routing-release:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.203.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15586" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-362" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cloudfoundry.org/blog/cve-2020-15586/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.cloudfoundry.org/blog/cve-2020-15586/" }, { "name": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g" }, { "name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w" }, { "name": "openSUSE-SU-2020:1087", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00077.html" }, { "name": "openSUSE-SU-2020:1095", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html" }, { "name": "FEDORA-2020-d75360e2b0", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCR6LAKCVKL55KJQPPBBWVQGOP7RL2RW/" }, { "name": "FEDORA-2020-9cd1204ba0", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/" }, { "name": "https://security.netapp.com/advisory/ntap-20200731-0005/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0005/" }, { "name": "openSUSE-SU-2020:1405", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html" }, { "name": "openSUSE-SU-2020:1407", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html" }, { "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2460-1] golang-1.8 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html" }, { "name": "DSA-4848", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4848" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } }, "lastModifiedDate": "2022-12-03T14:31Z", "publishedDate": "2020-07-17T16:15Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.